2412647fe794c5ab1eb2f9629554811bdafe096130fd8888db010cc725be31c30cd56729d1ede8cccb3929eb369d04310919b26144926090caee9575f1572aadc74da707420164ae340f10bda6ebd7c99d1d63be9c6db37b5fb30c18cbc05c0cce5137b08dfce22c9bf87e69e95e7479b8f1d7042696357dffa5da90c0f1bfd00ec287bd2a4fcfb6e38271fa6e6fe72b11eda032162fd527d138c4b222d7c962ada3a6614a7b69fe88eae1a03af62cd420ef67bdf19dd527f5cead8b698668fc3b3e72dc16840f3f70b1a1a75b79279df002f77c3e9c14900bd15a47c930c799fc82b78aab89d7e4b17c374508db2d2dc0fdbf65eafc33f187311f62808006a5c392058356ba2995f3c0b209c45b439772d2d40a297ea653c9b8d00e4f166b5470f5051efb97bece8367e5aed6e0eba3f75b2f0793b0778755f2210ba59e169fa7fbdbfc5c3e7272b50d6bcec42273f6968bfd3ba9a4d054735b7535b933ad948e943bcf360dd16bcbc6ffc09a43b4056684ce347ffaa2a28a85acc5d7c853a7734708224fdf345c69415e2891d251737aeca16f12e8b3bdfb35e555e42ea9523dbf8f90a9d34b92747c6d62bd1ca1fcc4a220d1c8021b2b4101240f02d4e5c422ecb3c4bc6525aaf5547a70e956767751fcd69c526fc593fe942d1866c11c596bfb8062afade36cbaae36770eba7c64e9170d7bc5bd096427d0b110c7b361e5cb9e2158c874c9f3cf814773370c814d7657a7571722dd038164dfb18b049f42a70a77e0937a7b9f3a9e178e7c8880848be1dd2ab59574e44a73cd12d79714ee84ee0088cfcb40cbd348be75f4b60d225b110b4cf6d11fc4a4d5e6625f0a3c9809fb0be5d06e4fef066dbd0b893a4f889297f56cccbf96ad6cd88e247fcc06c1dacdae9f2168c76ddbb470e262dcfa5cc125a94cb4b06fff4bfeb64f7fbc7f19c022f4e4717796e8cc0cf28c40bcf74670a07e2bfd5c4eab45819539231929704dfb53adcdaa2eb624bf6b0d6d764e9eb5f9f1d95af2e22550d0e43b62a8268439d9ba00eb2225a8156f8f9c874dec2d470c2e979285d4b5a47f60594ed81d2a08907857f62fbc914e0971eb07f38881d4335b13f59e9cbfc17d0db0faa009bc8ce834bedb27614db4230b3b2bb3a18f449f87b67da80a867194e5e0be44227c07426b88b38c79256181b8d5ed04c5d5eb4454eb8402bcc8fcf3aa3ff5fb5bd0b4619462072066138457dfabbda3a2ae6ade05346376c219a7d77b0c22f48fc07d97b6f0048b8d1a15528764056a6ffd1c09d5414f99f01c60fcc01680787ba1579c22058b2723240cb7cd7b72f3b216a4bd5d9d8841cb09434241abbfed5086daab6fb438cfc81a714442307dd71e8ff51b2fd3a86f4cb93bd08543d6c01ec1e5be1c40b88f4e4b67aff9760db41ba171db48cce89fdf20ddfbc574cb309f2aedd69cd86bdd17483212e11d75f0d4e2cd28614159115afe93731873bfecb8ab6e88f718781b4991133cedf60671175bb96285872da1ba5fe2e23b71fc470d0d8bc50237636114c535a70cf49b3ba90b9315be3146bdf0a1f6129180894eea91730d9c1d5f4ef68c494367e24b7648d1285cb8ac84e423e87764086aaf5ce54ab9e2be98afdf16fcb8be65f895a2791aa15ac16b86786fd78de2645efc1958f4ec1d92a40d9064c4651f72b5cc8d9bd7b263e919d6abebc8faf3192d85af8bbb11b0a32e0cd830d277004dcbe60f76e31ecf183c74cf7c35f2ff69c1fc8399f95da3bb503b6fdd286eacb2e71fd01ddfe78f0ad1f1288e99491eff79328dcddcc365bfba437e87ac2dd0870630c37610ca6b029935ba885dcac74b04379e6122dd20d62eec88c87ebdff8186ea0e8b6ea45f62510b5b409962f877509f2df55034736270a95249cfcf727ec2bfe9755419b95c94bc3717b94495005acdb966b19b0c6cb460024f3fab67fd997412d0bfc4cf2191bbfc0db80957f461825433d4ba5c1b94d3e632d80b829f341d50ec29ea40983c41ba6687919e9f243db71e805d0ce375f8ff9ed15946b75262c2ef4438410816a7c95861b7105e67b0285e4f3847c5f0393dbe6f1fda9ed6d0275ef69916e506a5cff2d7a9f20d6fbf75cff37ad4c01cc701e9918879646e2c6b81b50332e40aea2c8c3d252fc232609b72757c099496f8144c9b511699716ce4a3729a210347fb0f88cbee6e7b47f4814950bc3a203b69fed4faa20cf8c8dc562e563e0cf37e9e3942044f4343574708cf712cc1a01ae159a6a8495b6e8404bbce662c7d404b10887327cb95e649f25e13622bb591c772d47f49cb26b3764ba29b33d9fd4ec6c6bb00e3b2c4dbbd852cbd3e47bbe89aad048d20f4f74dfbd299afed363fe348358e4615ba46f49b7b2a5e77eeec77fc9e557f9b2f9d923b60e6c2b2951b3d2932e9a195e3ebc641a04c536352d45e68649e56a2a51ef2a9def8fa86acf1f44ad55c2536d328444d33b57217d858af94e6bbcbaa960eeba211398f704e3c40469437d97773ecd86188845f6ed395d7f19a4ff0f25c97e48ec0fb7225d866226b41e3dc478e6a431e21f8a0b4223d4f101f2ce1ffcb3c3961566a646820d477940ae533c7fa0bcdf44c75508bf9f95d2fee7b62b1b0012a622864e8b600369291436ff3f0c648d4a012d29791cceb3784ca9835a0f8529b160d696fdecd2d4fc781fb314911162aeb15acc47854b02b3a4f8f3abee2344bc5cb119a619da90df3f5ed9ef0196b48ed28c8eae46199b08c9b7f5e16873908b384f07f77314b813433b50fc33130f85ff4c6975ebf02d09e2c81294dfde1843a53710c183273661a64725660f99a8075", @generic="b4e3c785c830083530b8725c629e1fdf5c577195f04e4c435d483532285930b9ed7d31b13946330832be2b3f3a2377c998afdbac7fbbf3b0a802bafe94b61e4bab6c9d565ca90053fc212c4014467fee3acb0744f5df11048af2d8abf9d7255edf3ce1f03f96f477bc415f7af960ce2b53bede04475b7bb987e072348bfd9ada65bf95cc8aa58f0a44065fba4085b64431b3d03333945363240f749a8f9856ba2b18ee68b8c556f5d45609de074143030385482ec97492938901258b93ce9b82c6223ec4ee4d9b95e74b87f04d", @generic="1661a2e4c1150fa729ab6d83fb129853aa2cc312f308b3fedaeae5a6440190f9715b0dc997592d64dc11d89f0a6710", @generic="1b0e131ef2934a574795530faeff04f3c710bb56771def76ad0ed88dfc97cd48cf6d3346cde873fbdb71920e1ce34f08bb5be322e8c8ec1e856ddf8777da1b6d0e44111d119556c6f564dc8db0a5f89c61e72cb9ce362724657a74c9b896c7937b9b2ab1aabc9a99dd7bbd326796ac1b7d2885776f6beba919c0027ec03cfee995cf9f964c6d161fc401f48770bfb2cbe2010e6e82d699af4a7ddb39256b666e03e0525f75522f6048d6f0fafdbedaff9082739ef91df0df23fd2b7d91cefcfde3771d45d643438a2c88b4f8b75182fdb4cf075e", @typed={0x8, 0x54, 0x0, 0x0, @u32=0x5}, @typed={0x14, 0xb, 0x0, 0x0, @ipv6=@rand_addr="d87c8a94ef3afd0ff114d0bcf0c6094e"}, @typed={0x8, 0x34, 0x0, 0x0, @fd=r0}]}, @generic="a034be1bfa92609da353ab3ab48da4287f6193c90d74c919ca03a1e856911aa3f33b6559a67ba252d85988654b35c5cda2c0c151938f0d8fd328a98373718ff0466b63ee5a6588bf22291834eeffef9a80c81993a914ee39286bea76f40804d0cc05d5edec5414decdb66fb880a22917e854e47a4858ecda95148b9247f470d11e58b812d21b2c50213faa0ec17ef8c6ef5fc35a275f366db2f8bf64630045080c41ad1658dcfbbcefcf186715b55f4f591d5df9a8e5", @typed={0x8, 0x6f, 0x0, 0x0, @pid=r4}]}, 0x133c}, 0x1, 0x0, 0x0, 0x4044}, 0x4044000) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 18:59:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) modify_ldt$read(0x0, &(0x7f0000000080)=""/71, 0x47) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000140)={0x9, r2}) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000440)={0x4, &(0x7f0000000180)=""/104, &(0x7f00000003c0)=[{0xd8, 0x7c, 0x8, &(0x7f0000000200)=""/124}, {0x0, 0x3e, 0x80000001, &(0x7f0000000280)=""/62}, {0x0, 0xc0, 0x7fffffff, &(0x7f00000002c0)=""/192}, {0x200, 0x0, 0x6, &(0x7f0000000380)}]}) r3 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r3, &(0x7f0000000000)) [ 1629.867543] FAULT_INJECTION: forcing a failure. [ 1629.867543] name failslab, interval 1, probability 0, space 0, times 0 [ 1629.899481] CPU: 0 PID: 2087 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1629.907341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1629.916876] Call Trace: [ 1629.919509] dump_stack+0x13e/0x194 [ 1629.923161] should_fail.cold+0x10a/0x14b [ 1629.927329] should_failslab+0xd6/0x130 [ 1629.931453] kmem_cache_alloc+0x2b5/0x770 [ 1629.935792] ? ioctl_preallocate+0x1a0/0x1a0 [ 1629.940218] getname_flags+0xc8/0x560 [ 1629.944640] SyS_mkdir+0x7b/0x210 [ 1629.948107] ? SyS_mkdirat+0x210/0x210 [ 1629.952001] ? fput+0xb/0x140 [ 1629.955115] ? do_syscall_64+0x4c/0x640 [ 1629.959112] ? SyS_mkdirat+0x210/0x210 [ 1629.963012] do_syscall_64+0x1d5/0x640 [ 1629.966917] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1629.972114] RIP: 0033:0x45b897 [ 1629.975394] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1629.983633] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045b897 [ 1629.990908] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000280 [ 1629.998186] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1630.005493] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1630.012779] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000023 18:59:32 executing program 3 (fault-call:3 fault-nth:36): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:32 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x40000, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f00000002c0)={0x6, 0x8, 0x0, [{0x8, 0x401, 0x913, 0x0, 0x40, 0x1, 0x12}, {0x3, 0xffffffffffffffff, 0x7f, 0x5, 0x80, 0x9}, {0x9, 0xfffffffffffffff8, 0x5, 0x81, 0x40, 0xff}, {0x3, 0x20, 0x2, 0x9a, 0x20, 0x7, 0x4}, {0x0, 0xdd4, 0x4, 0x4, 0x4, 0x94, 0x3}, {0x9, 0x7, 0x30ae, 0x40, 0x5, 0xff, 0x9}, {0x6, 0x0, 0xdfd7, 0x3f, 0x7, 0x8, 0x4}, {0x5, 0x9, 0x7fffffff, 0x8a, 0x23, 0x7, 0x15}]}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x602900, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r3, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r3, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x40003ad, 0x2000000) fremovexattr(r3, &(0x7f0000000240)=@known='trusted.syz\x00') ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000140)={0x0, 0x80, 0x91, &(0x7f0000000040)=0xdfb}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000500)=0x1000) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000640)={0x0, 0x0, [], @bt={0x3, 0x3b5, 0x7, 0x6, 0x200, 0xffff, 0x8, 0xe}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r7 = dup(r5) ioctl$SG_GET_ACCESS_COUNT(r7, 0x2289, &(0x7f0000000600)) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r7, 0x111, 0x3, 0x0, 0x4) [ 1630.114547] FAULT_INJECTION: forcing a failure. [ 1630.114547] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1630.126399] CPU: 0 PID: 2100 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1630.134197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1630.143555] Call Trace: [ 1630.146158] dump_stack+0x13e/0x194 [ 1630.149801] should_fail.cold+0x10a/0x14b [ 1630.153973] __alloc_pages_nodemask+0x1bf/0x700 [ 1630.158682] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1630.163713] ? find_held_lock+0x2d/0x110 [ 1630.167797] cache_grow_begin+0x7b/0x410 [ 1630.171869] kmem_cache_alloc+0x695/0x770 [ 1630.176030] ? ioctl_preallocate+0x1a0/0x1a0 [ 1630.180451] getname_flags+0xc8/0x560 [ 1630.184257] SyS_mkdir+0x7b/0x210 [ 1630.187718] ? SyS_mkdirat+0x210/0x210 [ 1630.192066] ? fput+0xb/0x140 [ 1630.195178] ? do_syscall_64+0x4c/0x640 [ 1630.199157] ? SyS_mkdirat+0x210/0x210 [ 1630.203055] do_syscall_64+0x1d5/0x640 [ 1630.206979] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1630.212194] RIP: 0033:0x45b897 [ 1630.215382] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1630.223097] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045b897 [ 1630.230371] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000280 [ 1630.237649] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1630.244926] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1630.252555] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000024 [ 1630.273063] hfs: unable to change codepage [ 1630.277506] hfs: unable to parse mount options [ 1630.374169] Unknown ioctl 4733 [ 1630.379954] Unknown ioctl -1064282524 [ 1630.407046] Unknown ioctl 4733 [ 1630.416087] Unknown ioctl -1064282524 18:59:32 executing program 3 (fault-call:3 fault-nth:37): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:32 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1630.490696] FAULT_INJECTION: forcing a failure. [ 1630.490696] name failslab, interval 1, probability 0, space 0, times 0 [ 1630.508604] CPU: 1 PID: 2111 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1630.516466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1630.525834] Call Trace: [ 1630.528440] dump_stack+0x13e/0x194 [ 1630.532094] should_fail.cold+0x10a/0x14b [ 1630.537335] should_failslab+0xd6/0x130 [ 1630.541407] kmem_cache_alloc_node_trace+0x292/0x7b0 [ 1630.546524] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1630.551989] ? __alloc_skb+0x9a/0x4c0 [ 1630.555893] __kmalloc_node_track_caller+0x38/0x70 [ 1630.560852] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1630.565554] __alloc_skb+0xca/0x4c0 [ 1630.569193] ? skb_trim+0x160/0x160 [ 1630.573884] ? netlink_has_listeners+0x1ff/0x310 [ 1630.578652] kobject_uevent_env+0x6d1/0xc50 [ 1630.583254] lo_ioctl+0x1192/0x1c40 [ 1630.586893] ? loop_probe+0x160/0x160 [ 1630.590687] blkdev_ioctl+0x91d/0x17d0 [ 1630.594570] ? blkpg_ioctl+0x8e0/0x8e0 [ 1630.598448] ? trace_hardirqs_on+0x10/0x10 [ 1630.602692] block_ioctl+0xd9/0x120 [ 1630.606308] ? blkdev_fallocate+0x3a0/0x3a0 [ 1630.610623] do_vfs_ioctl+0x75a/0xfe0 [ 1630.614418] ? selinux_file_mprotect+0x5c0/0x5c0 [ 1630.619770] ? ioctl_preallocate+0x1a0/0x1a0 [ 1630.624198] ? security_file_ioctl+0x76/0xb0 [ 1630.628587] ? security_file_ioctl+0x83/0xb0 [ 1630.632982] SyS_ioctl+0x7f/0xb0 [ 1630.636331] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1630.640302] do_syscall_64+0x1d5/0x640 [ 1630.644181] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1630.649442] RIP: 0033:0x45c2e7 [ 1630.652700] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1630.660392] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045c2e7 [ 1630.667730] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1630.675441] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1630.682909] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 18:59:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x5) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r8 = dup(r7) ioctl$SG_GET_ACCESS_COUNT(r8, 0x2289, &(0x7f0000000600)) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r10 = dup(r9) ioctl$SG_GET_ACCESS_COUNT(r10, 0x2289, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYRES64=r0]) ioctl$VIDIOC_ENUM_FRAMESIZES(r6, 0xc02c564a, &(0x7f0000000100)={0x81, 0x32314d59, 0x1, @discrete={0x1, 0xef86}}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setfsuid(r11) [ 1630.690180] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000025 18:59:33 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206010000000000000000000000000010000300686173683a69702c6d61630005020400000000040900020073797a300000000005000500020000000500010006000000"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1630.785154] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1630.824011] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 18:59:33 executing program 0: perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0xff, 0x2, 0xfd, 0x0, 0x9, 0x16008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x6, 0x4) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000240)={0xd44, 0x0, 0xffffffffffff5ffc}, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000040)=""/2, 0x2}], 0x1) syz_emit_ethernet(0x207843, &(0x7f0000000380)=ANY=[@ANYBLOB="02aaaaaaa1aa000000000049f96a8a0f61d11a62490086dd60b4090000ff002dd9e1a82559ec9e00000000000000ffffe0f9ffffffffffffff0000000000000000000001830090780009040060b680fa0000000000000000000000000000ffb86b8ccc53e90000000000000a0100"/125], 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000180)=0x3) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00200000b7060000ffffffff2d64050000000000650404000100000004040000e9ff7c60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0dc28dac72599456d4c4e6f3fe2d1dee18f638ac93812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f04a8e9a14d40bf5375bd1e82f2fa109b7de897c6738fc8e9afb644b45c8b1bcec2dac85a7a478244e70d84f9220978253f5728fe0a0ddece5f243060297db3070ed599592af49f8529626156986b206dc0dd6d4828ee5662fe373c83e3398a45bf53bfcdb43b6ee8f8c43a7510d22b7b34d63bb0d458c48c3370208504021f8e6224bf733c885351a4c7ee7df27c13623bc6d9d352ce4026f738b7b9185daa97576806a00524ae84b6d7c8246e7cd4238a5c0d6aca2cea37b82fc1b2b53359d22bb12dbc6f01d90c21c3b64775788b72e72d7424f0e4177d94cb225d358964d451bc0f484d57cb6a0e0333c14e8f48f448df55c0bcc3dcd3d94fcdb8e59e672796b2adcb0ac0f2dfd81f7e783aece3084f2ddecd8995511d9d9a41439c407d30d675469a03e6f9f795694f797944ee32642eb2f45bd3dc1f8ce8aa836fc9f8e376ee3281bfe5d79cd922ef41ce2e09e75258d77029f8610bb20997ac0bc611cd896264a9648bfc82eb21789d19fadf2db93d7afc4d09d4bb0e43598cda736ad04210cc40c6710de7c31ad1abb9506af911d15dc72e73d07d1685d949b3a86d2589a6b8e1b9f35d2586352bfbf42f1911b25ab74b008e545742221738139ccedb679f2c315f6b5efc84d2ab9d0a7045be46f98c48dc32e4327ea4a5664769a35293142b2bfb2c4ba559f84b000000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r7 = dup(r6) ioctl$SG_GET_ACCESS_COUNT(r7, 0x2289, &(0x7f0000000600)) getsockopt$netrom_NETROM_IDLE(r7, 0x103, 0x7, &(0x7f0000000300)=0x2, &(0x7f0000000340)=0x4) fgetxattr(r5, &(0x7f00000002c0)=@known='system.sockprotoname\x00', &(0x7f0000000440)=""/188, 0xbc) [ 1630.957291] hfs: unable to change codepage [ 1630.963255] hfs: unable to parse mount options 18:59:33 executing program 3 (fault-call:3 fault-nth:38): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1631.046048] Unknown ioctl 1074292231 [ 1631.089514] FAULT_INJECTION: forcing a failure. [ 1631.089514] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.129423] CPU: 0 PID: 2133 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1631.137354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1631.146721] Call Trace: [ 1631.149332] dump_stack+0x13e/0x194 [ 1631.152964] should_fail.cold+0x10a/0x14b [ 1631.157121] should_failslab+0xd6/0x130 [ 1631.161096] kmem_cache_alloc+0x2b5/0x770 [ 1631.165243] ? __d_lookup+0x3b4/0x670 [ 1631.169077] ? mark_held_locks+0xa6/0xf0 [ 1631.173127] __d_alloc+0x2a/0x9b0 [ 1631.176588] d_alloc+0x46/0x250 [ 1631.179858] __lookup_hash+0x51/0x180 [ 1631.183646] filename_create+0x156/0x400 [ 1631.187704] ? kern_path_mountpoint+0x40/0x40 [ 1631.192189] SyS_mkdir+0x90/0x210 [ 1631.195629] ? SyS_mkdirat+0x210/0x210 [ 1631.199511] ? do_syscall_64+0x4c/0x640 [ 1631.203471] ? SyS_mkdirat+0x210/0x210 [ 1631.207348] do_syscall_64+0x1d5/0x640 [ 1631.211226] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1631.216401] RIP: 0033:0x45b897 [ 1631.219587] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1631.227294] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045b897 [ 1631.234637] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000280 [ 1631.241991] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1631.249245] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1631.256513] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000026 18:59:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='Nselinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) [ 1631.312601] Unknown ioctl 1074292231 18:59:33 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206010000000000000000000000000010000300686173683a69702c6d8a8e33dc2b616300050004000092a4ebfd7c3f33b1797a30000000000580050002000000050001"], 0x48}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x80}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) write(r4, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) r5 = socket(0x10, 0x2, 0x0) sendto(r5, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0xac0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f00000012c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000025d000"/88], 0x58) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab64}], 0x1, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaefaaaaaaaaaaaaaa008100000086dd6034000000442f00fe8000000020000000000000000000bbfe8000000000000000000000000000aa242065580000000000000800000086dd080088be08000003100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000"], 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000bc0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x80082, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='smaps\x00') preadv(r6, &(0x7f0000000100)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0xaf4) splice(r6, &(0x7f0000000100)=0x3, r3, &(0x7f0000000140)=0x5, 0x948, 0x5) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001240)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r7, 0x6, 0x15, &(0x7f0000001280)=0x40, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200407ec, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r5, 0x28, 0x6, &(0x7f0000001340)={0x77359400}, 0x10) 18:59:33 executing program 3 (fault-call:3 fault-nth:39): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1631.533392] FAULT_INJECTION: forcing a failure. [ 1631.533392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1631.545257] CPU: 0 PID: 2149 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1631.553072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1631.562530] Call Trace: [ 1631.565136] dump_stack+0x13e/0x194 [ 1631.568790] should_fail.cold+0x10a/0x14b [ 1631.572956] __alloc_pages_nodemask+0x1bf/0x700 [ 1631.577647] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1631.582692] ? ____cache_alloc_node+0x153/0x1c0 [ 1631.587518] ? lock_acquire+0x170/0x3f0 [ 1631.591535] cache_grow_begin+0x7b/0x410 [ 1631.595615] ? do_raw_spin_unlock+0x164/0x250 [ 1631.600257] ____cache_alloc_node+0x16d/0x1c0 [ 1631.604769] ? check_preemption_disabled+0x35/0x240 [ 1631.609809] kmem_cache_alloc+0x1ea/0x770 [ 1631.613996] ? ioctl_preallocate+0x1a0/0x1a0 [ 1631.618423] getname_flags+0xc8/0x560 [ 1631.622245] SyS_mkdir+0x7b/0x210 [ 1631.625719] ? SyS_mkdirat+0x210/0x210 [ 1631.629622] ? fput+0xb/0x140 [ 1631.632745] ? do_syscall_64+0x4c/0x640 [ 1631.637253] ? SyS_mkdirat+0x210/0x210 [ 1631.641155] do_syscall_64+0x1d5/0x640 [ 1631.645067] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1631.650263] RIP: 0033:0x45b897 [ 1631.653460] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1631.661174] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045b897 [ 1631.668466] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000280 [ 1631.675863] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a 18:59:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8010100) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080)="44208989fa5b60aa6fdfe4e3ca26a5dd5c2e49c2052d53e2dfa3fd2791ba7e317537dfcdd3eaaa052751fd3bf7eeb633e021b8e4fb9f34f4de20e559408de270f056ba02667dacf9fd622832577a66784347aaa7ec17f1a30f0cf45d9f63db", &(0x7f0000000100)="5b20a2a568bb3e3967f827f67ec6af3ac64a9fc3e1269757c16427581e18ebb656580b109729109c8029af81916b93e38088e9d5ba7721ec878c41b1971c00a5357e2a0d813075d078de6d61d014b28ede70526d2705000499ef4467a01144291c7954425c171a74cbb30077ddefff8ca779fc824bf4d9105be880e0999c0db4f314ca18b9cc96bdfa037c391ab1a5ed11162432e8626e0f889cdc8519bddd54117e287551dc520aa7e2978017a7932cfa34b166244c98ac060ae9523a17b4c21aa954c5fe1aec308b7d7381fd22bea5c53ed82f781ae8f45b8e5a3e3fabfb64ae9e5c0c646605f84d0c43ec9fc29619179786"}}) [ 1631.683141] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1631.690608] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000027 [ 1631.707927] hfs: unable to change codepage [ 1631.717549] hfs: unable to parse mount options 18:59:34 executing program 3 (fault-call:3 fault-nth:40): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1631.996120] FAULT_INJECTION: forcing a failure. [ 1631.996120] name failslab, interval 1, probability 0, space 0, times 0 [ 1632.007859] CPU: 1 PID: 2161 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1632.015699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1632.025247] Call Trace: [ 1632.027860] dump_stack+0x13e/0x194 [ 1632.031541] should_fail.cold+0x10a/0x14b [ 1632.035698] ? save_trace+0x290/0x290 [ 1632.039514] should_failslab+0xd6/0x130 [ 1632.043681] __kmalloc+0x71/0x7c0 [ 1632.047145] ? context_struct_to_string+0x323/0x610 [ 1632.052192] ? mls_compute_context_len+0x3dc/0x5c0 [ 1632.057572] ? flex_array_get+0x1b2/0x230 [ 1632.061737] context_struct_to_string+0x323/0x610 [ 1632.066595] ? security_load_policycaps+0x310/0x310 [ 1632.071627] ? sidtab_search_core+0x17f/0x2a0 [ 1632.076146] security_sid_to_context_core+0x187/0x200 [ 1632.081370] selinux_inode_init_security+0x45a/0x680 [ 1632.087119] ? ext4_get_acl+0xcb/0x500 [ 1632.091021] ? selinux_inode_create+0x30/0x30 [ 1632.095531] ? ext4_get_acl+0xd0/0x500 [ 1632.099437] security_inode_init_security+0x15f/0x320 [ 1632.104639] ? ext4_init_acl+0x190/0x190 [ 1632.108799] ? security_kernel_post_read_file+0xd0/0xd0 [ 1632.114176] ? insert_inode_locked+0x39e/0x4b0 [ 1632.118844] __ext4_new_inode+0x3385/0x4860 [ 1632.123217] ? ext4_free_inode+0x1190/0x1190 [ 1632.127644] ? avc_has_perm_noaudit+0x400/0x400 [ 1632.132918] ? dquot_get_next_dqblk+0x160/0x160 [ 1632.137629] ? security_transition_sid+0xcb/0x120 [ 1632.142568] ? security_transition_sid+0x9d/0x120 [ 1632.147505] ext4_mkdir+0x2e4/0xb60 [ 1632.151253] ? selinux_dentry_init_security+0x220/0x220 [ 1632.156639] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1632.161321] ? security_inode_mkdir+0xcc/0x100 [ 1632.170618] vfs_mkdir+0x3af/0x620 [ 1632.174623] SyS_mkdir+0x1bc/0x210 [ 1632.178181] ? SyS_mkdirat+0x210/0x210 [ 1632.182079] ? do_syscall_64+0x4c/0x640 [ 1632.186061] ? SyS_mkdirat+0x210/0x210 [ 1632.189956] do_syscall_64+0x1d5/0x640 [ 1632.193864] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1632.199057] RIP: 0033:0x45b897 [ 1632.202256] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1632.209968] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045b897 [ 1632.217250] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000280 [ 1632.224529] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1632.232330] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1632.239622] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000028 18:59:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 18:59:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000380)={0x0, @empty, @loopback}, &(0x7f00000003c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vxcan1\x00', r4}) 18:59:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x3ff}, 0x0, 0x14, 0xffffffffffffffff, 0x3) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 18:59:35 executing program 3 (fault-call:3 fault-nth:41): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1632.671370] FAULT_INJECTION: forcing a failure. [ 1632.671370] name failslab, interval 1, probability 0, space 0, times 0 [ 1632.684010] CPU: 0 PID: 2186 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1632.691846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1632.701511] Call Trace: [ 1632.704120] dump_stack+0x13e/0x194 [ 1632.707852] should_fail.cold+0x10a/0x14b [ 1632.712030] should_failslab+0xd6/0x130 [ 1632.716028] __kmalloc+0x2e9/0x7c0 18:59:35 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0xffffffd0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = getpgrp(0xffffffffffffffff) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) timer_create(0x4, &(0x7f0000000400)={0x0, 0x19, 0x4}, &(0x7f0000000440)=0x0) timer_getoverrun(r4) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000600)={0x2, 0x0, [0x0, 0x0]}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r7 = accept$ax25(r6, &(0x7f0000000480)={{0x3, @netrom}, [@netrom, @rose, @default, @netrom, @netrom, @netrom, @bcast, @netrom]}, &(0x7f0000000640)=0x48) r8 = syz_open_dev$admmidi(&(0x7f0000001ac0)='/dev/admmidi#\x00', 0x80000000, 0x2000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r8, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x800}, 0x5) setsockopt$inet6_mtu(r8, 0x29, 0x17, 0x0, 0x0) sendfile(r7, r8, &(0x7f0000000540)=0x6, 0x80) chown(&(0x7f0000000140)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={r1, r3, r9}, 0xc) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r10, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="48000000020601000000000010000300686173683a69702c6d61630005000400000000000900020073797a300000000005000500020000000500010006000000eeff7eca6c719d92af05113a04bb5c50d8d84c699a4c042d0080c18d1fe72df872d917ee7c534b2fe3f53a8e0000000000000000"], 0x48}}, 0x0) r11 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) r12 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r13, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r11, &(0x7f00000002c0)={0x78, 0x0, 0x2, {0x101, 0x4, 0x0, {0x3, 0x38, 0x5, 0x0, 0x5, 0x0, 0x400, 0x5, 0x1, 0x8, 0x7, r13, r14, 0x6, 0x1}}}, 0x78) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r15 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r15, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$BINDER_SET_CONTEXT_MGR(r15, 0x40046207, 0x0) [ 1632.719937] ? ext4_find_extent+0x71a/0x990 [ 1632.724274] ? __lock_acquire+0x5f7/0x4620 [ 1632.728699] ext4_find_extent+0x71a/0x990 [ 1632.732955] ext4_ext_map_blocks+0x16f/0x4b80 [ 1632.737469] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1632.742493] ? save_trace+0x290/0x290 [ 1632.746334] ? lock_acquire+0x170/0x3f0 [ 1632.750336] ? ext4_map_blocks+0x3c7/0x1610 [ 1632.754680] ext4_map_blocks+0xc6b/0x1610 [ 1632.758851] ? ext4_issue_zeroout+0x150/0x150 [ 1632.763362] ? __brelse+0x43/0x60 [ 1632.766837] ? __ext4_new_inode+0x24a/0x4860 [ 1632.771273] ext4_getblk+0x98/0x3f0 [ 1632.774918] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1632.779382] ext4_bread+0x6c/0x1a0 [ 1632.782930] ? ext4_getblk+0x3f0/0x3f0 [ 1632.786822] ? dquot_get_next_dqblk+0x160/0x160 [ 1632.791503] ? security_transition_sid+0xcb/0x120 [ 1632.797132] ? security_transition_sid+0x9d/0x120 [ 1632.801986] ext4_append+0x143/0x350 [ 1632.805738] ext4_mkdir+0x4c9/0xb60 [ 1632.809393] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1632.814077] ? security_inode_mkdir+0xcc/0x100 [ 1632.818678] vfs_mkdir+0x3af/0x620 [ 1632.822242] SyS_mkdir+0x1bc/0x210 [ 1632.825804] ? SyS_mkdirat+0x210/0x210 [ 1632.829880] ? do_syscall_64+0x4c/0x640 [ 1632.833865] ? SyS_mkdirat+0x210/0x210 [ 1632.837764] do_syscall_64+0x1d5/0x640 [ 1632.841737] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1632.847122] RIP: 0033:0x45b897 [ 1632.850320] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1632.858400] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045b897 18:59:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140), 0x10) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000100)={0x0, 0x5}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) ioctl$SG_SET_DEBUG(r5, 0x227e, &(0x7f0000000080)) ioctl$RTC_WIE_OFF(r3, 0x7010) mq_notify(r2, &(0x7f0000000000)) [ 1632.865675] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000280 [ 1632.870071] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1632.872940] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1632.888952] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1632.896332] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000029 [ 1632.906038] hfs: unable to change codepage [ 1632.933892] hfs: unable to parse mount options 18:59:35 executing program 3 (fault-call:3 fault-nth:42): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1633.066153] FAULT_INJECTION: forcing a failure. [ 1633.066153] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.084631] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1633.106221] CPU: 0 PID: 2197 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1633.114068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1633.123451] Call Trace: [ 1633.126093] dump_stack+0x13e/0x194 [ 1633.129749] should_fail.cold+0x10a/0x14b [ 1633.133927] should_failslab+0xd6/0x130 [ 1633.137945] __kmalloc+0x2e9/0x7c0 [ 1633.141504] ? ext4_find_extent+0x71a/0x990 [ 1633.146023] ? __lock_acquire+0x5f7/0x4620 [ 1633.150280] ext4_find_extent+0x71a/0x990 [ 1633.154465] ext4_ext_map_blocks+0x16f/0x4b80 [ 1633.158987] ? save_trace+0x290/0x290 [ 1633.162865] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1633.167889] ? save_trace+0x290/0x290 [ 1633.171722] ? lock_acquire+0x170/0x3f0 [ 1633.175706] ? ext4_map_blocks+0x798/0x1610 [ 1633.180068] ext4_map_blocks+0x7ea/0x1610 [ 1633.184325] ? ext4_issue_zeroout+0x150/0x150 [ 1633.188839] ? __brelse+0x43/0x60 [ 1633.192310] ? __ext4_new_inode+0x24a/0x4860 [ 1633.196747] ext4_getblk+0x98/0x3f0 [ 1633.200389] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1633.204734] ext4_bread+0x6c/0x1a0 [ 1633.208289] ? ext4_getblk+0x3f0/0x3f0 [ 1633.212180] ? dquot_get_next_dqblk+0x160/0x160 [ 1633.216862] ? security_transition_sid+0xcb/0x120 [ 1633.221715] ? security_transition_sid+0x9d/0x120 [ 1633.226576] ext4_append+0x143/0x350 [ 1633.230317] ext4_mkdir+0x4c9/0xb60 [ 1633.233959] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1633.238825] ? security_inode_mkdir+0xcc/0x100 [ 1633.243425] vfs_mkdir+0x3af/0x620 [ 1633.247158] SyS_mkdir+0x1bc/0x210 [ 1633.250716] ? SyS_mkdirat+0x210/0x210 [ 1633.254625] ? do_syscall_64+0x4c/0x640 [ 1633.258609] ? SyS_mkdirat+0x210/0x210 [ 1633.262517] do_syscall_64+0x1d5/0x640 [ 1633.266430] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1633.271636] RIP: 0033:0x45b897 [ 1633.274831] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1633.282548] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045b897 [ 1633.289831] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000280 [ 1633.297114] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1633.305696] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1633.312979] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 000000000000002a 18:59:35 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0xffffffffffffff88, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x0, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_PROTOCOL, @IPSET_ATTR_PROTOCOL, @IPSET_ATTR_REVISION={0x0, 0x4, 0x3}, @IPSET_ATTR_REVISION={0x0, 0x4, 0x1}]}, 0x48}}, 0x4000) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 18:59:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000080)={0x3}) 18:59:36 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = socket(0xf, 0x7, 0x1f) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @empty}}, 0x3, 0x3, 0x9, 0x77, 0x10001}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r2, &(0x7f0000000140)=0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 18:59:36 executing program 3 (fault-call:3 fault-nth:43): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1633.674512] FAULT_INJECTION: forcing a failure. [ 1633.674512] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.722628] CPU: 0 PID: 2218 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1633.730546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1633.739933] Call Trace: [ 1633.742674] dump_stack+0x13e/0x194 [ 1633.746330] should_fail.cold+0x10a/0x14b [ 1633.750677] should_failslab+0xd6/0x130 [ 1633.754679] __kmalloc+0x2e9/0x7c0 [ 1633.758246] ? ext4_find_extent+0x71a/0x990 [ 1633.762599] ? __lock_acquire+0x5f7/0x4620 [ 1633.766868] ext4_find_extent+0x71a/0x990 18:59:36 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x52b00}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x20000015) [ 1633.771043] ext4_ext_map_blocks+0x16f/0x4b80 [ 1633.775694] ? save_trace+0x290/0x290 [ 1633.779522] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1633.784745] ? save_trace+0x290/0x290 [ 1633.788591] ? lock_acquire+0x170/0x3f0 [ 1633.792585] ? ext4_map_blocks+0x798/0x1610 [ 1633.796935] ext4_map_blocks+0x7ea/0x1610 [ 1633.801110] ? ext4_issue_zeroout+0x150/0x150 [ 1633.805625] ? __brelse+0x43/0x60 [ 1633.809100] ? __ext4_new_inode+0x24a/0x4860 [ 1633.813789] ext4_getblk+0x98/0x3f0 [ 1633.817442] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1633.821894] ext4_bread+0x6c/0x1a0 [ 1633.825455] ? ext4_getblk+0x3f0/0x3f0 [ 1633.829363] ? dquot_get_next_dqblk+0x160/0x160 [ 1633.834049] ? security_transition_sid+0xcb/0x120 [ 1633.840645] ? security_transition_sid+0x9d/0x120 [ 1633.845520] ext4_append+0x143/0x350 [ 1633.849262] ext4_mkdir+0x4c9/0xb60 [ 1633.852916] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1633.858070] ? security_inode_mkdir+0xcc/0x100 [ 1633.862696] vfs_mkdir+0x3af/0x620 [ 1633.866259] SyS_mkdir+0x1bc/0x210 [ 1633.869815] ? SyS_mkdirat+0x210/0x210 [ 1633.873716] ? do_syscall_64+0x4c/0x640 [ 1633.877712] ? SyS_mkdirat+0x210/0x210 [ 1633.881711] do_syscall_64+0x1d5/0x640 [ 1633.885624] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1633.890956] RIP: 0033:0x45b897 [ 1633.894167] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1633.901999] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045b897 [ 1633.909311] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000280 [ 1633.916596] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1633.923877] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1633.931161] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 000000000000002b 18:59:36 executing program 3 (fault-call:3 fault-nth:44): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:36 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000180)='mqueue\x00', 0x10, 0x0) exit(0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) close(r0) r1 = pkey_alloc(0x0, 0x0) pkey_free(r1) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, r1) [ 1634.098321] FAULT_INJECTION: forcing a failure. [ 1634.098321] name failslab, interval 1, probability 0, space 0, times 0 [ 1634.164639] CPU: 1 PID: 2230 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1634.172490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1634.182037] Call Trace: [ 1634.184651] dump_stack+0x13e/0x194 [ 1634.188302] should_fail.cold+0x10a/0x14b [ 1634.192474] should_failslab+0xd6/0x130 [ 1634.196460] kmem_cache_alloc+0x2b5/0x770 [ 1634.200619] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1634.205636] ? __mark_inode_dirty+0xbf7/0x1020 [ 1634.210408] ext4_mb_new_blocks+0x522/0x3a60 [ 1634.214861] ? ext4_ext_search_right+0x2bc/0xaa0 [ 1634.219713] ? ext4_inode_to_goal_block+0x2a6/0x3b0 [ 1634.224742] ext4_ext_map_blocks+0x24cd/0x4b80 [ 1634.229334] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1634.234356] ? save_trace+0x290/0x290 [ 1634.238270] ext4_map_blocks+0x7ea/0x1610 [ 1634.242623] ? ext4_issue_zeroout+0x150/0x150 [ 1634.247128] ? __brelse+0x43/0x60 [ 1634.250584] ? __ext4_new_inode+0x24a/0x4860 [ 1634.255000] ext4_getblk+0x98/0x3f0 [ 1634.258629] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1634.262966] ext4_bread+0x6c/0x1a0 [ 1634.266505] ? ext4_getblk+0x3f0/0x3f0 [ 1634.270392] ? dquot_get_next_dqblk+0x160/0x160 [ 1634.275065] ? security_transition_sid+0xcb/0x120 [ 1634.279915] ? security_transition_sid+0x9d/0x120 [ 1634.284766] ext4_append+0x143/0x350 [ 1634.288507] ext4_mkdir+0x4c9/0xb60 [ 1634.292157] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1634.297020] ? security_inode_mkdir+0xcc/0x100 [ 1634.301620] vfs_mkdir+0x3af/0x620 [ 1634.305168] SyS_mkdir+0x1bc/0x210 [ 1634.308806] ? SyS_mkdirat+0x210/0x210 [ 1634.312710] ? do_syscall_64+0x4c/0x640 [ 1634.316800] ? SyS_mkdirat+0x210/0x210 [ 1634.320699] do_syscall_64+0x1d5/0x640 [ 1634.324600] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1634.329800] RIP: 0033:0x45b897 [ 1634.332993] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1634.340720] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045b897 [ 1634.348004] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000280 [ 1634.355405] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1634.362672] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1634.369940] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 000000000000002c 18:59:37 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="48000000020601000000000000000800e3ffffff0f0003006861630400000100000000d500007954e064fe57bcfc3bf586b0d94b41979cd0a505000204012000001c00060000002e0000"], 0x1}}, 0x4004000) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 18:59:37 executing program 3 (fault-call:3 fault-nth:45): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:37 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000000206010000000000000000000000000005000100070000876087c00000000073797a300000000005000500020000000500010006000000000000000040b3b0afdd3068fe370dbde485e954fe7f30bafc3c822fc6e5c6284c22709a87c88000d6eb1e9e3131ca4b069c4593927b28e123884568d21dfd4d7ace98e224a64b5ebe2b084a2a9f9a9f158ce596a10e2ca4"], 0x40}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1634.941529] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1634.952416] FAULT_INJECTION: forcing a failure. [ 1634.952416] name failslab, interval 1, probability 0, space 0, times 0 [ 1634.974113] CPU: 0 PID: 2248 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1634.981970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1634.991373] Call Trace: [ 1634.993986] dump_stack+0x13e/0x194 [ 1634.997640] should_fail.cold+0x10a/0x14b [ 1635.001818] should_failslab+0xd6/0x130 [ 1635.005825] __kmalloc_track_caller+0x2e1/0x7b0 [ 1635.010514] ? strndup_user+0x5b/0xf0 [ 1635.014332] ? mntput_no_expire+0xee/0x800 [ 1635.018602] memdup_user+0x22/0xa0 [ 1635.022170] strndup_user+0x5b/0xf0 [ 1635.025810] ? copy_mnt_ns+0x8a0/0x8a0 [ 1635.029724] SyS_mount+0x39/0x120 [ 1635.033191] ? copy_mnt_ns+0x8a0/0x8a0 [ 1635.037185] do_syscall_64+0x1d5/0x640 18:59:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x3, 0x2}, 'port0\x00', 0x4, 0x4c, 0x101, 0x0, 0x20, 0x1000, 0x7ff, 0x0, 0x2, 0x3}) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) ioctl$KVM_GET_PIT(r3, 0xc048ae65, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x20000800) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r7, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000900)={@empty, 0x0}, &(0x7f0000000940)=0x14) getsockname$packet(r1, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000009c0)=0x14) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r10, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r11, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r12 = socket(0x11, 0x800000003, 0x0) bind(r12, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r12, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r13, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r14 = socket(0x11, 0x800000003, 0x0) bind(r14, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r14, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r15, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r16 = socket(0x11, 0x800000003, 0x0) bind(r16, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r16, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r17, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) r19 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r19, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet_IP_XFRM_POLICY(r19, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) r21 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r21, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r21, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockopt$inet6_IPV6_XFRM_POLICY(r21, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000d40)=0xe8) r23 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r23, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r23, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockopt$inet_pktinfo(r23, 0x0, 0x8, &(0x7f0000000f00)={0x0, @broadcast, @empty}, &(0x7f0000000f40)=0xc) getpeername$packet(r3, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000fc0)=0x14) r26 = socket(0x11, 0x800000003, 0x0) bind(r26, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r26, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r27, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000003240)={0x0, @broadcast, @multicast2}, &(0x7f0000003280)=0xc) r29 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r29, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r30 = dup(r29) ioctl$SG_GET_ACCESS_COUNT(r30, 0x2289, &(0x7f0000000600)) r31 = socket(0x11, 0x800000003, 0x0) bind(r31, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r31, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r32, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r30, 0x8933, &(0x7f00000032c0)={'vxcan1\x00', r32}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003300)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000003400)=0xe8) r35 = socket(0x11, 0x800000003, 0x0) bind(r35, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r35, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r36, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000003440)={'team0\x00', r36}) r38 = socket(0x11, 0x800000003, 0x0) bind(r38, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r38, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r39, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r40 = socket(0x11, 0x800000003, 0x0) bind(r40, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r40, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r41, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$sock_SIOCDELRT(r4, 0x890c, &(0x7f0000003580)={0x0, @ipx={0x4, 0x400, 0x7fff, "abc0c87f7110", 0x5}, @sco, @can={0x1d, 0x0}, 0xf93, 0x0, 0x0, 0x0, 0x400, &(0x7f0000003540)='geneve0\x00', 0x62, 0x4}) r43 = socket(0x11, 0x800000003, 0x0) bind(r43, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r43, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r44, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003600)={'team0\x00', 0x0}) r46 = socket(0x11, 0x800000003, 0x0) bind(r46, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r46, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r47, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r48 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r48, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r49 = dup(r48) ioctl$SG_GET_ACCESS_COUNT(r49, 0x2289, &(0x7f0000000600)) getsockopt$inet_IP_IPSEC_POLICY(r49, 0x0, 0x10, &(0x7f0000003700)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000003800)=0xe8) r51 = socket(0x11, 0x800000003, 0x0) bind(r51, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r51, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r52, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r53 = socket(0x11, 0x800000003, 0x0) bind(r53, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r53, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r54, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r55 = socket(0x11, 0x800000003, 0x0) bind(r55, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r55, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r56, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r57 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r57, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet_mreqn(r57, 0x0, 0x20, &(0x7f0000004880)={@remote, @broadcast, 0x0}, &(0x7f00000048c0)=0xc) r59 = socket(0x11, 0x800000003, 0x0) bind(r59, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r59, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r60, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r61 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r61, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet6_mreq(r61, 0x29, 0x1c, &(0x7f0000004900)={@loopback, 0x0}, &(0x7f0000004940)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000005240)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000005200)={&(0x7f0000004980)={0x868, r5, 0x100, 0x70bd26, 0x25dfdbfc, {}, [{{0x8, 0x1, r7}, {0x17c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5fd}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0xc4, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8f}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r22}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x356}}, {0x8, 0x6, r24}}}]}}, {{0x8, 0x1, r25}, {0xfc, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r28}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xfffffff7}}, {0x8, 0x6, r33}}}]}}, {{0x8, 0x1, r34}, {0x16c, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r37}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r39}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r41}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r42}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r44}}}]}}, {{0x8, 0x1, r45}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r47}}}]}}, {{0x8, 0x1, r50}, {0x1ec, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r52}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r54}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1ab5}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r56}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r58}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x184}}}]}}, {{0x8, 0x1, r60}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x16}}, {0x8, 0x6, r62}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x20}}}]}}]}, 0x868}, 0x1, 0x0, 0x0, 0x1000c000}, 0x40) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r63 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r63, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000440)={0x0, 0x6, [@broadcast, @local, @random="b0f223633a02", @empty, @empty, @empty]}) r64 = dup(r63) ioctl$SG_GET_ACCESS_COUNT(r64, 0x2289, &(0x7f0000000600)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r64, 0x40505330, &(0x7f0000000380)={{0xf0, 0x2}, {0x7c, 0x3}, 0x5, 0x1}) r65 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xef, &(0x7f00001a7f05)=""/239, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}, 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r65, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x21) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r66}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x0, 0x9, &(0x7f00000001c0)='.selinux\x00', r66}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r67}, 0xc) r68 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r68, &(0x7f0000000000)) [ 1635.041094] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1635.046427] RIP: 0033:0x45eeca [ 1635.049622] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1635.057531] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1635.064814] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1635.072097] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1635.079384] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1635.086664] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 000000000000002d 18:59:37 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r2, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x40003ad, 0x2000000) ioctl$sock_proto_private(r2, 0x89e7, &(0x7f0000000440)="cf43411045b370c361fc08120389d6833fad80269b96ab64ee08558e1559d3b2caa83ca256aa020a1715ddf399066a3eaaaad84809bcc36c38708b968850d118529d89eb88fc537a605f3c3e049c91bd255b49bf5b4132bfe8611edada49cef58eb1f44a30480835cb4131d64132bc6bd17d2bb22186e3f247c8386cc33dde212b1b60864b8fb0f6718635d091202641ce5deea1e5c212eae448c2ca189f394a326a3070f003a7a55a86b0aa26d45ef347e9a97906c70791d81041e76ff126e6c7489ed43f4e280d1f54aeebbb29") r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="16c6c45db987d333000057", @ANYRES16=r3, @ANYBLOB="9db2b1dad270b1e805beae06861116e6803b32fd401538fb1b605786c92e256622e70e865a2aad32a47d1ccb000000000000"], 0x3}}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x238, r3, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa769}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3ff000}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xd2bd}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3d}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_SOCK={0x84, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xdaa}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xafe}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x88c}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xace}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffc01}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffff81}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf145}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7dcc}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x380000000}]}, @TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2282}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) 18:59:37 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000040)=0x6) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800ff7f0000000000000000683a69a844becfd926702c6d61630005000400000000000900020073797a300000000005000500020000000500"/72], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 18:59:37 executing program 3 (fault-call:3 fault-nth:46): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:37 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) sendmsg$NFT_MSG_GETSET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x24, 0xa, 0xa, 0x635cdae8306ab7b9, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x37}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x20040000) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1635.259157] FAULT_INJECTION: forcing a failure. [ 1635.259157] name failslab, interval 1, probability 0, space 0, times 0 [ 1635.278647] CPU: 0 PID: 2265 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1635.286490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1635.295860] Call Trace: [ 1635.298475] dump_stack+0x13e/0x194 [ 1635.302127] should_fail.cold+0x10a/0x14b [ 1635.306292] should_failslab+0xd6/0x130 [ 1635.310279] kmem_cache_alloc+0x2b5/0x770 [ 1635.314443] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1635.319491] ? __mark_inode_dirty+0xbf7/0x1020 [ 1635.324706] ext4_mb_new_blocks+0x522/0x3a60 [ 1635.329143] ? ext4_ext_search_right+0x2bc/0xaa0 [ 1635.333924] ? ext4_inode_to_goal_block+0x2a6/0x3b0 [ 1635.338964] ext4_ext_map_blocks+0x24cd/0x4b80 [ 1635.343596] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1635.348655] ? save_trace+0x290/0x290 [ 1635.352544] ext4_map_blocks+0x7ea/0x1610 [ 1635.356879] ? ext4_issue_zeroout+0x150/0x150 [ 1635.361390] ? __brelse+0x43/0x60 [ 1635.364855] ? __ext4_new_inode+0x24a/0x4860 [ 1635.369294] ext4_getblk+0x98/0x3f0 [ 1635.373029] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1635.377381] ext4_bread+0x6c/0x1a0 [ 1635.380942] ? ext4_getblk+0x3f0/0x3f0 [ 1635.384855] ? dquot_get_next_dqblk+0x160/0x160 [ 1635.389562] ? security_transition_sid+0xcb/0x120 [ 1635.394417] ? security_transition_sid+0x9d/0x120 [ 1635.399275] ext4_append+0x143/0x350 [ 1635.403014] ext4_mkdir+0x4c9/0xb60 [ 1635.406661] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1635.411443] ? security_inode_mkdir+0xcc/0x100 [ 1635.416065] vfs_mkdir+0x3af/0x620 [ 1635.419648] SyS_mkdir+0x1bc/0x210 [ 1635.423228] ? SyS_mkdirat+0x210/0x210 [ 1635.427130] ? do_syscall_64+0x4c/0x640 [ 1635.431120] ? SyS_mkdirat+0x210/0x210 [ 1635.435028] do_syscall_64+0x1d5/0x640 [ 1635.439024] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1635.444482] RIP: 0033:0x45b897 [ 1635.447678] RSP: 002b:00007f760d17aa68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1635.455398] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045b897 [ 1635.462675] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000280 [ 1635.469960] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a [ 1635.477239] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 1635.484697] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 000000000000002e 18:59:38 executing program 3 (fault-call:3 fault-nth:47): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:38 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) rt_sigsuspend(&(0x7f0000000000)={[0x81]}, 0x8) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1635.632801] FAULT_INJECTION: forcing a failure. [ 1635.632801] name failslab, interval 1, probability 0, space 0, times 0 [ 1635.667627] CPU: 1 PID: 2277 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1635.675501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1635.684884] Call Trace: [ 1635.687490] dump_stack+0x13e/0x194 [ 1635.691220] should_fail.cold+0x10a/0x14b [ 1635.695390] should_failslab+0xd6/0x130 [ 1635.699467] __kmalloc_track_caller+0x2e1/0x7b0 [ 1635.704152] ? strndup_user+0x5b/0xf0 [ 1635.708201] ? mntput_no_expire+0xee/0x800 [ 1635.712441] memdup_user+0x22/0xa0 [ 1635.715970] strndup_user+0x5b/0xf0 [ 1635.719616] ? copy_mnt_ns+0x8a0/0x8a0 [ 1635.723506] SyS_mount+0x39/0x120 [ 1635.726973] ? copy_mnt_ns+0x8a0/0x8a0 [ 1635.730899] do_syscall_64+0x1d5/0x640 [ 1635.734792] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1635.740074] RIP: 0033:0x45eeca [ 1635.743261] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1635.750969] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1635.758245] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1635.765608] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1635.772870] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1635.780125] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 000000000000002f 18:59:38 executing program 3 (fault-call:3 fault-nth:48): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:38 executing program 4: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) [ 1636.084203] FAULT_INJECTION: forcing a failure. [ 1636.084203] name failslab, interval 1, probability 0, space 0, times 0 [ 1636.128349] CPU: 1 PID: 2291 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1636.136344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1636.145713] Call Trace: [ 1636.148323] dump_stack+0x13e/0x194 [ 1636.151980] should_fail.cold+0x10a/0x14b [ 1636.156154] should_failslab+0xd6/0x130 [ 1636.160150] kmem_cache_alloc+0x2b5/0x770 [ 1636.164326] ? save_trace+0x290/0x290 [ 1636.168156] getname_flags+0xc8/0x560 [ 1636.171979] user_path_at_empty+0x2a/0x50 [ 1636.176146] do_mount+0x10b/0x24f0 [ 1636.179707] ? copy_mount_options+0x59/0x2e0 [ 1636.184127] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1636.189159] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1636.194021] ? copy_mount_string+0x40/0x40 [ 1636.198276] ? __might_fault+0x177/0x1b0 [ 1636.203147] ? _copy_from_user+0x94/0x100 [ 1636.207311] ? copy_mnt_ns+0x8a0/0x8a0 [ 1636.211233] ? copy_mount_options+0x1ec/0x2e0 [ 1636.215743] ? copy_mnt_ns+0x8a0/0x8a0 [ 1636.219656] SyS_mount+0xa8/0x120 [ 1636.223123] ? copy_mnt_ns+0x8a0/0x8a0 [ 1636.227028] do_syscall_64+0x1d5/0x640 [ 1636.230942] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1636.236144] RIP: 0033:0x45eeca [ 1636.239339] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1636.247061] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1636.254402] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1636.261717] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1636.269024] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1636.276321] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000030 18:59:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x8, 0x80001) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x21a, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x10, 0x5, 0x9}, &(0x7f0000000180)=0xffffffffffffff01, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x1}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r1, 0x10, &(0x7f0000000380)={&(0x7f00000010c0)=""/4096, 0x1000, r2}}, 0x10) 18:59:38 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f0000000000)=""/68, &(0x7f0000000140)=0x44) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 18:59:38 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffff, 0xc63}, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r1, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x40003ad, 0x2000000) fcntl$notify(r1, 0x402, 0x2) 18:59:39 executing program 3 (fault-call:3 fault-nth:49): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000000206010000b50400000000000000000010000300686173683a69702c6d61630005000400000000000900020073797a30000000000500050002000000050001000600000033fdf026c1d49966494b04594a4f07fd427b06114df350c62bb61f6f7d9dfd4eed38b307b0177b37cb8870206148d5372ead51ee62d6da45df3296d19d0076e20f246662bcb9611932e73305aa31c2f9777739b96897d0dd9809d2280a8f052ee36ebacc516bfa42c5a3484ae67b8d2bff334d41"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 18:59:39 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r0, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x40003ad, 0x2000000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x80010) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0xfc3a, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) connect$pptp(r4, &(0x7f0000000040)={0x18, 0x2, {0x2, @multicast1}}, 0x1e) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 18:59:39 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000140), 0x4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000140), 0x4) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000200)='./file0/bus\x00', 0x180) splice(r0, &(0x7f0000000000)=0x8fba, r1, &(0x7f0000000040)=0x9, 0xce1, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x6) prctl$PR_GET_SECUREBITS(0x1b) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000240)) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) 18:59:39 executing program 2: munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="44000000020601000000000000000000000000000c00ed8a5086f8cdea9c700005000400000000000900020073797a300000000005000500020000000500010006000000"], 0x44}}, 0x0) r1 = pkey_alloc(0x0, 0x0) pkey_free(r1) pkey_mprotect(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x1, r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$SNDCTL_DSP_GETOPTR(r2, 0x800c5012, &(0x7f0000000000)) 18:59:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x4010850) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$VT_WAITACTIVE(r4, 0x5607) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000080)={0x10000, 0x2, {0xffffffffffffffff, 0x3, 0xe3, 0x2, 0xa30}, 0x1}) mq_notify(r2, &(0x7f0000000000)) [ 1637.283935] Unknown ioctl -2146676718 [ 1637.285685] FAULT_INJECTION: forcing a failure. [ 1637.285685] name failslab, interval 1, probability 0, space 0, times 0 18:59:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffd}, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x50}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) read$fb(r2, &(0x7f0000000000)=""/56, 0x38) 18:59:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="500000e59c0002060100000000000000000000000000180007800c00018008000140ac1414be080009400000000500000000000084ed6a4c020073797a30000020000500f50003000000050001000600"], 0x50}}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000080)={r7}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000240)={r7, 0x1ff, 0x1}, &(0x7f0000000280)=0x8) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000180)="74f494816fb8619e442cef840977f7a1f3cb31a489db2df548addccb4da5", 0xfffffffffffffdf9) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r9 = getpgrp(0x0) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x1, r9}) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x7aec}, 0x8) r10 = syz_open_pts(0xffffffffffffffff, 0x50880) ioctl$TCGETS2(r10, 0x802c542a, &(0x7f0000000200)) [ 1637.383803] CPU: 0 PID: 2329 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1637.392802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.402295] Call Trace: [ 1637.404908] dump_stack+0x13e/0x194 [ 1637.408563] should_fail.cold+0x10a/0x14b [ 1637.412739] should_failslab+0xd6/0x130 [ 1637.416740] kmem_cache_alloc+0x2b5/0x770 [ 1637.420916] ? save_trace+0x290/0x290 [ 1637.424728] getname_flags+0xc8/0x560 [ 1637.428532] user_path_at_empty+0x2a/0x50 [ 1637.432695] do_mount+0x10b/0x24f0 [ 1637.436221] ? copy_mount_options+0x59/0x2e0 [ 1637.440689] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1637.445697] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1637.450627] ? copy_mount_string+0x40/0x40 [ 1637.454850] ? __might_fault+0x177/0x1b0 [ 1637.458897] ? _copy_from_user+0x94/0x100 [ 1637.463026] ? copy_mnt_ns+0x8a0/0x8a0 [ 1637.466912] ? copy_mount_options+0x1ec/0x2e0 [ 1637.471410] ? copy_mnt_ns+0x8a0/0x8a0 [ 1637.475282] SyS_mount+0xa8/0x120 [ 1637.478719] ? copy_mnt_ns+0x8a0/0x8a0 [ 1637.482598] do_syscall_64+0x1d5/0x640 [ 1637.486476] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1637.491649] RIP: 0033:0x45eeca [ 1637.494822] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1637.502527] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1637.509792] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1637.517057] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1637.524315] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1637.531570] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000031 18:59:40 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x40000, 0x22}, 0x10}, 0x78) r3 = syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0x7ff, 0x40020) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000480)={0x8, 0x3, 0x5}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r2) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000180)={0x9b0000, 0x0, 0x7b8, r2, 0x0, &(0x7f0000000140)={0x203e0, 0x6, [], @p_u8=&(0x7f0000000040)=0xff}}) bind$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x3d, @empty, 0x8000}, 0x1c) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000000206030000ee63a9fa41c1030ed930ab"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) readlinkat(r6, &(0x7f0000000280)='./file0\x00', &(0x7f0000000600)=""/200, 0xc8) sendto$llc(r5, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r5, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r5, &(0x7f0000001380), 0x40003ad, 0x2000000) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000000)={0x8, 0x1, 0x4, 0x20, 0x943e, 0x5}) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r7, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r7, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r7, &(0x7f0000001380), 0x40003ad, 0x2000000) signalfd4(r7, &(0x7f0000000300)={[0x5]}, 0x8, 0x0) [ 1637.585813] Unknown ioctl 22023 [ 1637.589514] Unknown ioctl 1080054598 [ 1637.623407] Unknown ioctl 22023 [ 1637.626979] Unknown ioctl 1080054598 18:59:40 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f0000000140)={0x80, 0x0, &(0x7f0000000000), &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$nfc_llcp(r0, &(0x7f0000003100)=[{&(0x7f0000000240)={0x27, 0x1, 0x1, 0x7, 0x9, 0x81, "9648d658ebf06a5dd65d79f823a88990823497a1642ce72a0b7f2736b0f60517cc5252cce6bd487268cca0aad192cce5af5458d3b279cd1a4e81c8072e8c63", 0x11}, 0x60, &(0x7f0000000640), 0x0, &(0x7f00000006c0)={0xd0, 0x3a, 0x4, "5ef9f2d10448edb4350b5e8e010596da54097d8c44d0b7c2256f29c9e16ae4a386d7613399b95309d0f11f708155ef270bc72462fee691a0348621b7db66533cf0179bb0e9ba938493405595a1b543a542d87c278b7833015c001e08eecd0da7a51046e79b0e186dcddd1a876cfdf5c8fe817a4a56404601f26295be251f18ecb5503c362525c499d890f065928f3225db71ef588d1745f169d85b9828546cd4415256bd85aff845d32c8d03e82eedd01e46ea04a878d49544679064a174"}, 0xd0, 0x10}, {&(0x7f00000007c0)={0x27, 0x1, 0x2, 0x3, 0x1, 0x3, "38057794c929f5df262fa5fad7cdda94fa9050aad58bcac88adb92c27f65530d17a08296e878bed7c4f03052580de338596a0c2b83e3eaa2f5f1879add1193", 0x3b}, 0x60, &(0x7f0000000c00)=[{&(0x7f0000000840)="c15f08ebb98e384fbfb88d5f71948bb908aaeecce827cad7a46e39372bf06c987af3bc3b5192b7763589fb6fa6447406b998f38347c6fccffb92aa2353083359f60f6197f47d03bcabc6d5ff8a2d876265a2aaafc24b460388f22e10533969cee1fc17d7a77d4022e0057ca443a3b4d3d092ef778f3d18d51850fca3d4f9c7bf9029664264698cb7325358d9ca5afbc4814545be42b0863996b8f02385986bf7d4b7c91978916ab7e84cfdc63825", 0xae}, {&(0x7f0000000900)="b6d59bc46c6e69b276ae170caf494440e7f1ed5bb9d4cac1bc679717f591a1c92d17f5aead95a139d84e022a1e15ec32318b64c1acf337738be021bf57e761c2bf5ae35518e4042e417f57c26e130f5bab5bdb883f9a8e28d700d0b4558a8b", 0x5f}, {&(0x7f00000010c0)="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", 0x1000}, {&(0x7f0000000980)="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", 0xfe}, {&(0x7f0000000180)="95019ed85a885e385842", 0xa}, {&(0x7f0000000a80)="0e33d6cd0a71ff981c70cd82d27612225f30131218a7455b30ab1fe32660707ba75ad070df6b86cfee288c91b35e13f5bfe66e863894f8328c564d46cd045ee69ce3cdfaab90d5b46eb11da98684642672ba215291dc32ca4b066a5b522cbfef8858c5a2ff0e0beb60ea4eb49326ab2bbabeea758b6f41572b4448e64f805c5080cf6f3863e6d5228fc007ea994824dffa3f5af8cf302d7c2adb05e6191f28a847fa9b299b8d7bfe3cfff246be04b768d5337ee4230d9772e2f0d7a2399e7731f3c0baddaebc04b1359a71f1ca0f7c0c68b337", 0xd3}, {&(0x7f0000000b80)="8656d197561d44d166e107edd91596b8a0eac1f077896a3d701bdd36ce5dc74f566832a6c55a9e2b55fd5656cd63a8b6d009af7c8e9b89a55be683458e4e513c54ec329c6181011a5482023aadf53286823bffdcc65626b0394d70cbcf15ede119977a30e54fb79eb1d6", 0x6a}], 0x7, 0x0, 0x0, 0x4010}, {&(0x7f0000000c80)={0x27, 0x0, 0x2, 0x1, 0x0, 0x9, "be612f90fccefd88e8a5fa29b01e640e5ccf90c954ee5e6bd865737e1193a96712eed66ba4e2454af25b957fe07a10121dbf4c697aa98b167d06767aa53dd9", 0x32}, 0x60, &(0x7f0000001000)=[{&(0x7f00000020c0)="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", 0x1000}, {&(0x7f0000000d00)="411446fe36fcff5a7ba5f2c883ecec", 0xf}, {&(0x7f0000000d40)="e618cdd10069509ed2c9a8f4c065b3c9319038afaab3c549c833c6c1202552b52259f6b2790a29363fd92fdb6ff9e5a5f5450848914ff17f29484d71b66e37c7eb93a84ba3cb2c89987257f8e387b311e01e", 0x52}, {&(0x7f0000000dc0)="e52211d884bd971080ff7316eaa1cece7bcbc76585424ea4870e0fdc24f73d672e4022bebee7f1e4de5efb8cd68d161ded19d9e57eb542ee063459f15656694a8aed66965dd0ffcbcab5235228b3e05b8b9d483061d5fe739b8bd03b4a66291672ca5126a57b241e783c110743bcc7bb00cbf08f5a279b63f051f53f4650eb657e58b404209255a7fbb80536d3d0e6d4efc3866d126f332ca15043fa0f84cc063ac8f6046ebe1d43fe95adbf02494911367fc88241b73eefb56a5d3743acdee89b0eca0d85208aad791e1dcf3b4d646bf543f18d6ea34fcb298c94454b", 0xdd}, {&(0x7f0000000ec0)}, {&(0x7f0000000f00)="0dedfd977a8159fcb6275b776ef315d65669855bb1524e20996c0b34744c7d115d573f6d1609fd87553d6f313573d66ec9646d7e51af623cee7b0441c7a785f758e614ce8d9d0ae43e38f458324da66259c67f34bbf476d9b3291d5e5212edec4d03440f9bc22ea46a517c8b3422048b398e600e5bed9a786ec4bb858fe90e09971a4cc4b773a31b1dbca68b656af7a25c1cdf0b617e546ee1123b55120ed15c1b89ebb10dab8fe3", 0xa8}, {&(0x7f0000000fc0)}], 0x7, &(0x7f00000030c0)={0x20, 0x104, 0x3000, "eeab09d96b6237b6d6edbad6"}, 0x20, 0x8090}], 0x3, 0x44008080) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x40) 18:59:40 executing program 3 (fault-call:3 fault-nth:50): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:40 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) unshare(0x8000400) r6 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000140), 0x4) statx(r2, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r8, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) statx(r10, &(0x7f0000000500)='./file0\x00', 0x800, 0x20, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./bus\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r12, 0x0) fsetxattr$system_posix_acl(r6, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x1}, [{0x2, 0x2, r7}], {0x4, 0x2}, [{0x8, 0x0, r8}, {0x8, 0x2, r9}, {0x8, 0xd, r11}, {0x8, 0x1, r12}], {0x10, 0x5}, {0x20, 0x6}}, 0x4c, 0x3) mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f00000001c0)) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r13+30000000}, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1637.758791] FAULT_INJECTION: forcing a failure. [ 1637.758791] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1637.771803] CPU: 1 PID: 2366 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1637.779650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.789018] Call Trace: [ 1637.791626] dump_stack+0x13e/0x194 [ 1637.795380] should_fail.cold+0x10a/0x14b [ 1637.799545] __alloc_pages_nodemask+0x1bf/0x700 [ 1637.804227] ? kmem_cache_alloc_trace+0x14d/0x7b0 18:59:40 executing program 2: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @default}, [@null, @netrom, @null, @bcast, @rose, @remote, @default, @null]}, &(0x7f00000003c0)=0x48) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$setsig(0x4203, r2, 0xc707, &(0x7f0000000000)={0x3, 0x80000000, 0xa1}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r4 = socket$inet(0x2, 0x4000000805, 0x0) creat(&(0x7f0000000380)='./file0\x00', 0x30) r5 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000004c0)) r6 = socket$inet_sctp(0x2, 0x5, 0x84) syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000400)='./file0/file0\x00', 0x10001, 0x2, &(0x7f0000000480)=[{&(0x7f0000000440)="0820034f8502eaae6f1ccfd563fc64f45db2b108a43269c9", 0x18, 0x6}, {&(0x7f0000000540)="783bea28c8bd760e09afab7498d93f28ed24ac29bd376abd083f15265494750dc3c4a11c4899fac0da3e94b1f443b1adbe9485d5aa317b3806868abf8cd2e8d58b1fbc357b08f61209e2b696743f58541f772934ad1bbc746465a808f484c703a474df03fb7af9624acb55e54cf16142141865b93c3e811c5fef660c1a84ce6a138551818569d0768bb16015d753c5df144f3cf65dcfb6cdabf866dfc66bce0f9ce6cdf2299c19dd4b917bfed4e781bdca97fc4cda39d210a6c3ec5bc1630216a93f28e2fdd8972efc3924678e5de5a59339ec10e5f86e9ac0d7f2718a8bcdaf", 0xe0, 0x7fffffff}], 0x90094, &(0x7f0000000640)={[{@shortname_win95='shortname=win95'}, {@utf8='utf8=1'}, {@fat=@errors_continue='errors=continue'}, {@fat=@dmask={'dmask', 0x3d, 0x401}}, {@fat=@codepage={'codepage', 0x3d, '862'}}], [{@hash='hash'}]}) r7 = dup3(r4, r6, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="00004622be89fa5cd41600", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f0000000080)={r9}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000240)={0x2, 0x24, 0x2, 0x8, 0x3, 0x3, 0x10001, 0x2, r9}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={r10, @in={{0x2, 0x4e21, @loopback}}}, 0x84) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r11, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 1637.809119] ? copy_mount_options+0x59/0x2e0 [ 1637.813548] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1637.818580] ? find_held_lock+0x2d/0x110 [ 1637.822671] cache_grow_begin+0x7b/0x410 [ 1637.826751] kmem_cache_alloc+0x695/0x770 [ 1637.831153] getname_flags+0xc8/0x560 [ 1637.835001] user_path_at_empty+0x2a/0x50 [ 1637.839170] do_mount+0x10b/0x24f0 [ 1637.842751] ? copy_mount_options+0x59/0x2e0 [ 1637.847183] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1637.852213] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1637.857083] ? copy_mount_string+0x40/0x40 [ 1637.861329] ? __might_fault+0x177/0x1b0 [ 1637.865434] ? _copy_from_user+0x94/0x100 [ 1637.869595] ? copy_mnt_ns+0x8a0/0x8a0 [ 1637.873497] ? copy_mount_options+0x1ec/0x2e0 [ 1637.878009] ? copy_mnt_ns+0x8a0/0x8a0 [ 1637.881908] SyS_mount+0xa8/0x120 [ 1637.885373] ? copy_mnt_ns+0x8a0/0x8a0 [ 1637.889272] do_syscall_64+0x1d5/0x640 [ 1637.893173] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1637.898365] RIP: 0033:0x45eeca [ 1637.901669] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 18:59:40 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206010000000000000000000000000010010300686173683a69702c6d61630005000400000500400900020073797a300000000005000500020000000500010006000003"], 0x48}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000800000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000000)) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1637.909389] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1637.916663] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1637.923944] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1637.931213] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1637.938656] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000032 18:59:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) ioctl$void(r5, 0xc0045878) ioctl$TIOCSETD(r3, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000080)={0xadc4, 0x3f, 0x0, {0x4, @vbi={0xfffffffb, 0x1, 0x0, 0x4745504a, [0x7f, 0x3], [0x1, 0x3], 0x1}}, 0x9}) mq_notify(r2, &(0x7f0000000000)={0x0, 0x6}) [ 1638.038312] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1638.065800] hfs: unable to change codepage [ 1638.082275] hfs: unable to parse mount options [ 1638.094775] Unknown ioctl -1056942500 18:59:40 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000200)=""/159, &(0x7f0000000040)=0x9f) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000000)) 18:59:40 executing program 3 (fault-call:3 fault-nth:51): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:40 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000000)=""/77) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206010000000000000000000000000010000300686173683a49702c6d61630005000400000000000900020073797a300000000005000500020000000500010006000000"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1638.281527] FAULT_INJECTION: forcing a failure. [ 1638.281527] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.309255] CPU: 1 PID: 2403 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1638.317108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1638.326472] Call Trace: [ 1638.329077] dump_stack+0x13e/0x194 [ 1638.332726] should_fail.cold+0x10a/0x14b [ 1638.336976] should_failslab+0xd6/0x130 [ 1638.337007] Can't find ip_set type hash:Ip,mac [ 1638.340977] __kmalloc_track_caller+0x2e1/0x7b0 [ 1638.340991] ? strndup_user+0x5b/0xf0 [ 1638.341006] ? __might_fault+0x177/0x1b0 [ 1638.341020] memdup_user+0x22/0xa0 [ 1638.341034] strndup_user+0x5b/0xf0 [ 1638.341043] ? copy_mnt_ns+0x8a0/0x8a0 [ 1638.341053] SyS_mount+0x68/0x120 [ 1638.341061] ? copy_mnt_ns+0x8a0/0x8a0 [ 1638.341075] do_syscall_64+0x1d5/0x640 18:59:40 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x80000000, 0x10000) sendto$inet(r0, &(0x7f00000010c0)="a6b1e009612558c3a014a62d543436a404b14322177de0529b5a94ac652633f7a7409f0bafa6144ac0a2f3c62b9d392358fb1ac7537293afc913186d9f1c0cb4db32294562c616e67cf663f1e178453ffeeb3dae9bc6ad51591c6d7775e0539221809c3d33f502d0abf068710be4bb0d155f3f34dfe586d39d345fc63f8f14316d35f7c52004be6c6403bae2402cac48b35e570deb9ab1d18372d35fcd15901cd4fcb3d8a86431470deabc2d8f9bb1dc1139caffa250690b88f9b763d31981157acaa7f70b4df8dbe58cd4a839585521a51d12b5c1b8f74c29f98bb3181e602748760ca69e57ae04703aca71fac03edcf32f27d15b4c56950f5742a72c1e8b11589696ed92b410fe9ec56e002ee55eba8bd25fb934a077dda4bfbe010224595f90911abc6a1941e6256f61cb3d85552289f73225ce95627c122d4390956a41508ace4de9af41e3c79f1946cc1df78f2fb57ae79211a5fbc7a21d4b0cc635600eed04eace1d9585ebc51975a760d31971238a4e2868a738a612e56b4aba7f7b49102ee7b1a09b05d0d219c5f35b9a4a2f262f57ad7095f3a3c1dd82fef3678afadfcc613cee42435137e1b49141548649adc357e3313c60dc9420f5287d1ee9afae8bb73c64f440a1596a747ea0214a3365ff2ebd8dbfba9f246fbabfb2dccb9bafa3b7284254fa79c4737a2a36e30111e8be1b77db55c4d70011a9b3f9007367a602d42e524235ea0fc67ddb40f34299d63a4ced6db66016934e0c1a86c9c3f49c53f91a5c79ff25eba2fdf2e3503172c36cd430714be96b451029e56074bf70d9ae2e394584eb011a25446124a502a2ed510610cdede554d8d4078994b13c36e1958348b769699cdc494ba041fdd964c03126024bfde7214559c5dace94cbc0b1c296fece7df2f84905ab97e8f3a2d4442bf53b24344acee4ea876510674f26615074ba74867c6f9a24cf647638a788e51d7bfd039c939c6da5582a7295e6a8ca4a018ad9340c0bccfd92010d392bff0eedc09621eac7ddd6b930b30eb452b8685cc44ec24b2c1fa3de52faeb5e247ff906b1a2c2f3257eeb97d2483fc600d60d9c97c3db0c9dd1c2bd3f394fabdd84a17001767ebb4ebde3c62950f4c209bd637e31573a669146a367f64572dcea6912ae08bbd254c5281e77551611447879e9d01273881f505aa60f8223a69e51b39f007f89869c1afa585dcd707fafb65b38843f99c4ddeb831a47d5356ff36bc709404eb7e92f470d5c9b4b4dc59b5d69f5dbed911b8ce40d90a725025f23b654b8e4e8649431f904258d9641022a442da29114a47c07fbe9e82ab7a45c9f9704a148e285606f4e1e8de6319699d647958ccfeb9892888759b5e34cb8fd8b060a3319726a3211da1ff138484c8088823c2df69f603126bb9af79cac8c4d59e479e7c00a34e3b6efeefd25dc45627658034c5b429fe506455d5fa028139cc610ae9a6580c9003ce831f2b7e5bd57385a8c1058ad666abf5da7285745ca713ff66ebc923cbe17f506b6b65e27a9213e78990dc9d74b0fcdcd899b99a18cfa125661380448eec84cf7516c4fc37b241906f7b5732fd2ccbb8629c1d6380e64c2488d958571ad4f24f47fd126625cff32e7071a025bab30e85433af598e2e9ef60e21d6ca0b5edd05f82a1db98c85761f949002e71e2de97f32142a6aeebae604cd317fa9a2e192615bd4beefb44b5698d5789924919aefc90c2b67d8867393723a07c6b3d137967aaacdb37bbe1b4dc84cb7ccc91740e7240a24259dcf3140235dc7672231c3957bf59f847e01bcf49d7f45ca5c7b7ebb5f268912cc89537e0afe3d21c758453c78a3b202b8ca9ba9836edaf89bef59fd0d47b52f84b8f2f783376979d0efce50329d3460580b537ec4f75ecb81e0ff0a4314aa940859120746bd72a0be6c9a3e354cb9216ee1e053fae964fdcfc824fa651eb90eac881326029da768b7eaad8e1a796aefeb262dd06d80ac0bc7dcac13e16b98e7c86cd539ea9cfab623be2dfff61173aa056f9f721670f7f1e83d937e2d609f3a9fdd3324c7d233918270a4c9037a8b71f7db6e6a9d6005b5be4366bf7ee5761c9325233ec160deb8e8dc7ac936d668c6b2264b0ef0dc30e3b444edc47a873b75d87d1e3e031c049cb42dac71e12930b1bbded25b845000597bc7aecb9165ddca3c235e5c8ba1208eace2dbee0a7eb37044622329c59f8b0c0c60eacec3d159964f71c826af8da1f36a05216bd82c39ed78d1397b79bf6560193120f50ccc94d00de558ac623edf1fd5b6c4b5f93112d0714dbc88604a0acde25e51a18392ab594a827ea763a883c97d98c960e3971071f36ae04b818eae00151d556cecc1a1c135b5976dc6dc3c3e4886f4a11a9721f60e728e13b184a9c38e6ecdfacd80ad0d4b9169b2c978a8fb39d606e0757ecdeefd1b024c2abf88a7c0553c60502d3b61aa054030b22af58b276b928bb3fdb79c7ef0245626c97ae113930d631e6986c254e1c4411d12b3fbee1221f3bca4a4f4025df43dd3931fecbae2172ba4f5539aa076c5d728b6cfa9fb5d590f266623cd7e8779f732033b452047d1a4fb35e68cf6b7f59664cd663ede43f664799185d4546abe9072675a6b0baaed4675fc52d6bda9115dd940268891dcc79ceaac5113d2cad9f52ca8083b9a547224dc8344de5ac5cbc7879e6bd125289aca4436956424e52b02163ea01eb8d796d6a899c7952ae6616383ea087fefe36d870a2022facc88345c6525a7be1f479037b6c42c29502079d4d12324683028ad034687a11bef2ce4649b2d7678c45dd16cfe2f8c7977104104ead2273f916de357daba1c2688d8d6adb05f36bd68d47f74f64ce47f0953290ef220809e9f4193047592148c32f354dbb214039b3982904f535bdf44d23582bb100624a25c5fab1aa630664b760ee062372e6c8eed611cd7f49d82b7f2a2c63b5710bc23229b10087b63fb99b241c6e67394b01a83cb0771ecb4065d5272a9c1ad77030e99b71cce70a6ae0db4900596add999a24f3fa85801c8778d36302664974d37b51d75437ca390f389417dee916712ab773110f75e9c9ecce4d5ec0bdb90b7320b24da426e03e1873f666462da22e84a21b00fd97a549ef030e02535969a45457d75e4fd8969c8949e770ca9da1edbf007c782c93196f2e0eb9e6dd3480c1ef6f3118dbeb5030ea080e3585cc29298d23c5ce6dad0187c7b52dc1f459c8aed9e7f435c75990c1742f2f19766da929ce40e0c6d3c6184229f5f1e9ca61d535a103d723f6206cd204adc5fd581ac7b98aee4f799c0fb47e2921150b63e938d2dba93fa7fecd0d5ac3a00a717f8ec05d2f2d0b72fff2f720226507a7783e3f826909f2da4bec41691a908bb46b07c54cd63bef0b0e3c0c3c3404e8479672e4c7d8395ffa94fcfbe2595f615b0275867d29258fcef1a3eb2891ce9413613525ecd5189bb277470f02172204f947d7e42ea233db61121b86b55b745e878c13b1b4970dcfe77acc326a5b1c2fab91b613fa380dfd2e708d90dada7ee6342d4307889ac162f614c0e672b5704d0c970e986ad3dafcba764664ecaa4cb6644bbdfad9b17c120ca6ee4f03b7648da107babc232acbdc6d3942c5d384193136b6b38feb7051436ba7083e8253e8e8b0300414ac9d3d49b44ab61355999c2eda1d96b7ea2d83f51dbf09ab564081ae92664eff2c3ea226779f4e21cb92b4353d126eb0d857092114b3374c1868e5844cf5235f8fcc2c922bef31120f5d57b3e3d01c082796fc01e9ccb8af02a0eb75d65db9e5db80c70f61c81446c40dc8898dbeb7f6924f5b4f30df796a2ae22cf2b071d86e70fe8d454c3996024f77ec493f8562bf646f9bcf5d2df915e19636bd5ee0e6f15b5ebc01ca6d0ad8c9d33e7f2211db2ae77589e551664ab6a0036e86b52d33b432300de2627c0e9ac34102df1dba500a1b8b8618a0e156747d50a0a2fc91fddc8f7bcc8d1f944c283e16b566e10a716f007af21a2c45dfdf5f2d7b8a0bc468913eebecc9600eb0776c910ddfc5e4b0d5f41bde46259faaf70d6da7d1a4a646c0350df34262cac091631b6e5392fc3eedd91422d7edd1300fa5fab1ddabaabb988f1937dff4eacb79760e5adf4eaeca6900839350884c4c1326ad23550bfe97c59315d675adf98126c823b5f6e9bf869cb174c06f0e2ed56f0a641849f90c8f0515cf4ade4f33c6998c8fe9d46afeb16ad78af15791387aff2cd00390b4474abf85905ea6cd993a2559f68e7e53c1c5aed984aeb696b758fd2219349981a79858441d0558d7055163586ea781f7fa5320894adbc069b98b00a1f555fc16e5ae7ebc4f66f72abc680bcff1af382f0043b2638d4bb407dbd6b6834a366108971e7b971e78209aa9d6aab9de03afa74edbf13c005ee2ee30f5232cdcee0a76c47d1ba9df0888cc6c0487914a240c1d52a11081b12ffff95119c458d7a91f5b5da8521894f0901120a70393bf3be8946f2aa708e06ca3770d195ddd6ef71b0f52c377064ddd579b4e6fa1bcc2cc0d62a2a681f3271af434a794e77759d2486d28beb2cb639b480e4c50a0f1ce99555c57cd576c2ee06f81868fdef2721436c99e5e3126f41d1d36c25a7a5c7493e770c04f724681a2387376484cc6457c54cc1db7a13f9094108eaafe1cfafaa2c258399e3aa7af6c3628406f7c45756157f3d068c42f168017f9ffcbda889e4e857189a502de480ec41523c259a1f6bf0e1915f1af112f9f061102b49099c1c96872d3c205e110f3c986d56076ae2854c8cceaf31e3149e2b15efccbb8743fbbfbc4c6de88a73fe7a96a22e081e841ed10ae1b3f209c4e3e3f94357947db1e4e8a19ccbcb8cd1abf1cd5e0fff6210f3937bd0d006992e5a9dca2277475eedb3ebcffc028b782e49402e736356d1f549470a3a972eb9fe6697dbef54907f2e5ad6534ac1687c6fe4b89193e5c069bb3ac44f017e05c7093fee54a5d0005ed5d4152d594075eb4ca44a56982e571277fc9afd61895e2881d074021f4ad00708c3c561452aa6915f00f924f540a088103349bded74eb3f9e27dbb79eed9fc0c2f59dc56b53b304f106e215074fee8ba8c3ef2cccc393a932cfedc5d5f591c50307502cfeec4cb23cfd625bd79ffd6b9de6b4b101b3c1622e669daded838c8e545aa5cb3101b8c590d0a4c7ae9fd6dadca2bc2e163358ad80e271265d23ea073977a1c20f1cd92bdd802360b6afc0c92117f4711383853c7453b49c6bc9bb9c434bee07698fe3c79e1c8980d975aa152dcd5a5817cebd2969b7d506eebcdd6a73360b1c344c9f49cbfe652dec8c991ef9bf4f8c2ecfe2f2cc79e5ca9c041efb5c7ac30a42abef93ced3765f263aadd64d46850b5990b1d9c9211efe3c9249233f37d3c528c9a990993013be7c6dc145a42c4a97ed31575dcb1380deea0050bc71a6890f39c3ebad2da51ff31f9cddc6e1066137aa4e652246c2da4e3aaff4b5d4e63afc31c3e7fbc45656252a59c2f51cc954120878ff46bb7d054d0bb96fad15c90b384ae45d3b58f2c921b3e547e3e56adae2d1be44a92e925044c36b4860bfc5fad5c966613d2e6c24c46283be0a722a583321290dec24cee2338b00b85de5b89f22ae34e2964bb0ec21f273339d228fd7bdb79a72f765ca32784c95fced10ed8aa7c500583127e34e7735f7db61884440eccf2755642caef7a98481094a02e161ec58f95cb39ebd4744da9c672feff0f593db49451ded6b9e99d76e999b8a3916810de509df220950926292643f6d86410d5c5683a7f731", 0x1000, 0x40000, &(0x7f0000000400)={0x2, 0x4e21, @empty}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_MCAST_RATE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000380)={0x6, 0x6, 0x80000001, 0x7}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) getsockopt$inet6_int(r4, 0x29, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1638.341092] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1638.341100] RIP: 0033:0x45eeca [ 1638.341106] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1638.341116] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1638.341125] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1638.411833] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1638.419207] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 18:59:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x478680, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x1, 0x10000000, 0x0, 0x5}, 0x0) r5 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r6, 0x0) r7 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r8, 0x0) stat(&(0x7f0000000880)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r9, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r13, 0x0) fsetxattr$system_posix_acl(r2, &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="02000000010002000000000002000000", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r6, @ANYBLOB="02000700", @ANYRES32=r3, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="040001000000000008000300", @ANYRES32=r9, @ANYBLOB="080002008b3267d022c2f902d17dfd53e61053add46af1b2c563c73d13d4e4100d1627f662136c3d970832f645a6bdde6e4597542e875d25698f2173adadf4977b5f21ed7eabf2207dde5fba39f869e6ff0a0de147318ef5258b2a14ed23827d5a493001d02a856de29d7f8eb0dc3fe81905f9c1a11213e679bb7ff87d7037de371a92bd8a92c90b034d6e22", @ANYRES32=r10, @ANYBLOB="08000500", @ANYRES32=r11, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=r13, @ANYBLOB="10000500000000002000000000000000"], 0x74, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f00000010c0)=ANY=[@ANYBLOB="181200000906010226bd7000fbdbdf250500000804002a0060005c800a5b3d0798a5a5a4bc34990064dfa43227793939a6aff5a224960879de03b6ba88b123c8773cb1a448554fe2638a82ecf0078d052a9fb17433bacd6b324935e881e3db7c8fcb637ce30dff5adac658c7fb48b1af08005b00", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00'], 0x1218}, 0x1, 0x0, 0x0, 0x20040000}, 0x8040) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') openat$dlm_control(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/dlm-control\x00', 0x270e42, 0x0) r15 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vsock\x00', 0x2041, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r15, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000100)={0x1c, r14, 0x4, 0x64bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc840}, 0x80) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r14, 0x20, 0x70bd28, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x8004) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000240)={0xfffffff, 0x0, 0x3, r0, 0x0, &(0x7f0000000180)={0x9909e2, 0x1ff, [], @p_u16=&(0x7f0000000140)=0x3}}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x50}, 0x1, 0x0, 0x0, 0x20040000}, 0x40) [ 1638.426499] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000033 18:59:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) read$midi(r1, &(0x7f0000000380)=""/223, 0xdf) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000100)=0x20, 0x8000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080)=0x4, 0x4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) 18:59:40 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x24100, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x30, r3, 0x2, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x100000001}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f00000002c0)={{0x3, 0x0, @identifier="4ae98729b9d3896b55439a69a0d66f96"}}) 18:59:41 executing program 3 (fault-call:3 fault-nth:52): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1638.575567] FAULT_INJECTION: forcing a failure. [ 1638.575567] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.599737] CPU: 1 PID: 2431 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1638.607590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1638.616948] Call Trace: [ 1638.619551] dump_stack+0x13e/0x194 [ 1638.623196] should_fail.cold+0x10a/0x14b [ 1638.627344] should_failslab+0xd6/0x130 [ 1638.631311] __kmalloc_track_caller+0x2e1/0x7b0 [ 1638.635971] ? kstrdup_const+0x35/0x60 [ 1638.639846] ? lock_acquire+0x170/0x3f0 [ 1638.643808] ? lock_downgrade+0x6e0/0x6e0 [ 1638.647942] kstrdup+0x36/0x70 [ 1638.651123] kstrdup_const+0x35/0x60 [ 1638.654825] alloc_vfsmnt+0xe0/0x7c0 [ 1638.658525] vfs_kern_mount.part.0+0x27/0x3c0 [ 1638.663007] do_mount+0x3c9/0x24f0 [ 1638.666534] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1638.671536] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1638.676369] ? copy_mount_string+0x40/0x40 [ 1638.680586] ? __might_fault+0x177/0x1b0 [ 1638.684651] ? _copy_from_user+0x94/0x100 [ 1638.688782] ? copy_mnt_ns+0x8a0/0x8a0 [ 1638.692658] ? copy_mount_options+0x1ec/0x2e0 [ 1638.697400] ? copy_mnt_ns+0x8a0/0x8a0 [ 1638.701302] SyS_mount+0xa8/0x120 [ 1638.704749] ? copy_mnt_ns+0x8a0/0x8a0 [ 1638.708659] do_syscall_64+0x1d5/0x640 [ 1638.712570] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1638.717749] RIP: 0033:0x45eeca [ 1638.720923] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1638.728614] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1638.735884] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1638.743138] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1638.750391] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1638.757666] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000034 18:59:41 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206010000000000000000000000000010000300686173553a69702c6d61630005000400000000000900020073797a300000000005000500020000000500010006000000"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x24000080) 18:59:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000280), &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) timer_create(0x6, &(0x7f0000000000)={0x0, 0x15, 0x1}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {r2, r3+30000000}}, &(0x7f0000000140)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000000206010000001d0000000000000000000c00030068617368050004000028107ba1626b669e797a30000000000500050002000000050001000600000000000000"], 0x44}}, 0x0) 18:59:41 executing program 5: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video1\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x94, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5, 0x14, 0x7f}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x21}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x401}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x9}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x3f}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x94}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x5c}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x6}, @IPSET_ATTR_PROBES={0x5}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x94}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) sendmsg$NFT_MSG_GETRULE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x7, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x1c}}, 0x40080) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000000)={0x1, 0x8, {r4}, {}, 0x1, 0x4}) tkill(r5, 0x1e) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x6) 18:59:41 executing program 3 (fault-call:3 fault-nth:53): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1639.018379] FAULT_INJECTION: forcing a failure. [ 1639.018379] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.031431] CPU: 1 PID: 2454 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1639.039389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1639.048789] Call Trace: [ 1639.051404] dump_stack+0x13e/0x194 [ 1639.055043] should_fail.cold+0x10a/0x14b [ 1639.059244] should_failslab+0xd6/0x130 [ 1639.063234] __kmalloc_track_caller+0x2e1/0x7b0 [ 1639.067915] ? kstrdup_const+0x35/0x60 [ 1639.071819] ? lock_acquire+0x170/0x3f0 [ 1639.075886] ? lock_downgrade+0x6e0/0x6e0 [ 1639.080035] kstrdup+0x36/0x70 [ 1639.083234] kstrdup_const+0x35/0x60 [ 1639.086948] alloc_vfsmnt+0xe0/0x7c0 [ 1639.090665] vfs_kern_mount.part.0+0x27/0x3c0 [ 1639.095162] do_mount+0x3c9/0x24f0 [ 1639.098722] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1639.103738] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1639.108606] ? copy_mount_string+0x40/0x40 [ 1639.112935] ? __might_fault+0x177/0x1b0 [ 1639.117015] ? _copy_from_user+0x94/0x100 [ 1639.121217] ? copy_mnt_ns+0x8a0/0x8a0 [ 1639.125123] ? copy_mount_options+0x1ec/0x2e0 [ 1639.129623] ? copy_mnt_ns+0x8a0/0x8a0 [ 1639.133516] SyS_mount+0xa8/0x120 [ 1639.137109] ? copy_mnt_ns+0x8a0/0x8a0 [ 1639.141200] do_syscall_64+0x1d5/0x640 [ 1639.145308] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1639.150621] RIP: 0033:0x45eeca [ 1639.153843] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1639.161679] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1639.168966] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1639.176252] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1639.183527] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1639.190909] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000035 [ 1639.203665] Unknown ioctl -1071094779 [ 1639.203921] Can't find ip_set type hasU:ip,mac 18:59:41 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x311002, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000040)=""/46) 18:59:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fe0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df985883767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f0000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) mq_notify(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, @tid=r5}) 18:59:41 executing program 0: socket$vsock_dgram(0x28, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4008880}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)=ANY=[@ANYBLOB="f9520986d2a24b6c00020000"]) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000002c0)={0x0, 0x28, "5fd2f0b4662ccd4e4f58f35115438235a514b907caf45e51e8405d66eefae877b8ecaae3b2a2f32a"}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x20000, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x3) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000180)=0x42c8, &(0x7f0000000240)=0x4) [ 1639.256035] Unknown ioctl -1071094779 18:59:41 executing program 3 (fault-call:3 fault-nth:54): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 18:59:41 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000300)) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000280)={0xffffffffffffed4c, 0x7, 0x3, 0x7, 0x9, 0x80}) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000140)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(r4, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"/331, @ANYRES16=r5, @ANYBLOB="010026bd7000fddbdf25010000001400060076657468305f6d6163767461700000001400020060cb3ab8738c792283113d4aaed88881140006007369743000000000000000000000000005000100010000000800050000000006"], 0x60}, 0x1, 0x0, 0x0, 0x4010}, 0x24000085) [ 1639.310338] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1639.382990] FAULT_INJECTION: forcing a failure. [ 1639.382990] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1639.409931] CPU: 1 PID: 2481 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1639.417786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1639.427170] Call Trace: [ 1639.429776] dump_stack+0x13e/0x194 18:59:41 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpgrp(r0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f00000002c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x34, 0x17, 0xa, 0x801, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x881}, 0x80) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000140)='veth1_to_hsr\x00') r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640)='nl80211\x00') r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r7, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) clock_adjtime(0x0, &(0x7f0000000780)={0x101, 0x9, 0x2, 0x1ff, 0x3, 0x6, 0x7fff, 0x9, 0x3, 0x100, 0x8, 0x1000, 0x1, 0x0, 0x8, 0x2, 0x2, 0xfffffffffffffffc, 0x1, 0x8, 0x1, 0x6, 0xffffffffffff8001, 0x0, 0x2, 0x4210}) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x74, r5, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x3}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x4}}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @NL80211_ATTR_MAC={0xa, 0x6, @random="814d159f2969"}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x80) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x7b9, &(0x7f0000000040)) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$RNDADDENTROPY(r9, 0x40085203, &(0x7f0000000380)={0x2, 0x74, "f91106325095ca17320e2b5b33dd7625c30b9399bca1dfb2debde4bf8e113be4eb64dac97629334d9c758b0296f3b5b1f856facba95e5ce1fbdfde468b3f2933c981fd7fd0f05ad61c46d0eecb1c618e8927149532786e95676115c288e84cd035ccc8465b1d762b56dd46e4ebed8215284c0d75"}) sendmsg$TIPC_NL_NET_GET(r8, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$TIOCL_UNBLANKSCREEN(r8, 0x541c, &(0x7f0000000000)) r10 = memfd_create(&(0x7f0000000180)='*}\x00', 0x2) fsetxattr$trusted_overlay_origin(r10, &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000440)='y\x00', 0x2, 0x2) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1639.433423] should_fail.cold+0x10a/0x14b [ 1639.437591] __alloc_pages_nodemask+0x1bf/0x700 [ 1639.442277] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1639.447301] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1639.452768] ? __alloc_pages_nodemask+0x5e0/0x700 [ 1639.457624] alloc_pages_current+0xe7/0x1e0 [ 1639.462100] __get_free_pages+0xb/0x40 [ 1639.465994] selinux_sb_copy_data+0x28/0x380 [ 1639.470414] security_sb_copy_data+0x6e/0xa0 [ 1639.474852] mount_fs+0x1e7/0x2a0 [ 1639.478311] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1639.482812] do_mount+0x3c9/0x24f0 [ 1639.486357] ? copy_mount_string+0x40/0x40 [ 1639.490593] ? copy_mount_options+0x140/0x2e0 [ 1639.495096] ? audit_add_tree_rule.cold+0x2f/0x2f [ 1639.499939] ? copy_mount_options+0x1ec/0x2e0 [ 1639.504451] ? copy_mnt_ns+0x8a0/0x8a0 [ 1639.508337] SyS_mount+0xa8/0x120 [ 1639.511784] ? copy_mnt_ns+0x8a0/0x8a0 [ 1639.515674] do_syscall_64+0x1d5/0x640 [ 1639.519565] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1639.524760] RIP: 0033:0x45eeca [ 1639.527947] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1639.535660] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1639.542928] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1639.550195] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1639.557471] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1639.564740] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000036 19:03:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="48000000020601000000000000000000000000001000030068617368b636be43ca81770205000400000000000900020073797a300000000005000500020000000500010006000000bf4d3928da3ba08672680e54d8e1a89e355af639ce0221d856ab50c777d78b96c030fa9474d306c6216b426269bab858ba504bd03b3015b55197ad49"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:03:58 executing program 3 (fault-call:3 fault-nth:55): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1639.629501] Unknown ioctl 1074287107 [ 1639.646969] Unknown ioctl 21532 [ 1639.708724] Unknown ioctl 1074287107 [ 1639.715901] Unknown ioctl 21532 [ 1639.723351] FAULT_INJECTION: forcing a failure. [ 1639.723351] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.739246] CPU: 0 PID: 2508 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1639.747094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1639.756461] Call Trace: 19:08:14 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000180)={0x9a0000, 0x800, 0x80000001, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0xa00966, 0x309, [], @p_u32=&(0x7f0000000040)=0x80000000}}) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @rand_addr=0x706}]}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x20000000) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f0000000000)) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000600)={0x2d8, r5, 0x200, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x94, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x58a5}]}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffff899}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0xe4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffff86}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x462e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffff800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x783b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x27}]}, @TIPC_NLA_LINK={0x48, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffd17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x2d8}, 0x1, 0x0, 0x0, 0x20040011}, 0x20000000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000380)={0x0, 0xa6, 0x3}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000400)={r6, 0x4, 0x3412}, &(0x7f0000000440)=0x8) [ 1639.759064] dump_stack+0x13e/0x194 [ 1639.762731] should_fail.cold+0x10a/0x14b [ 1639.767109] should_failslab+0xd6/0x130 [ 1639.771280] kmem_cache_alloc+0x2b5/0x770 [ 1639.775537] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1639.780576] getname_kernel+0x4e/0x340 [ 1639.784483] kern_path+0x1b/0x40 [ 1639.787897] lookup_bdev.part.0+0x60/0x160 [ 1639.788803] Unknown ioctl -1071622585 [ 1639.792150] ? blkdev_open+0x250/0x250 [ 1639.792164] blkdev_get_by_path+0x70/0xf0 [ 1639.792182] mount_bdev+0x4c/0x370 [ 1639.792254] ? hfs_show_options+0x570/0x570 [ 1639.792268] mount_fs+0x92/0x2a0 [ 1639.801859] Unknown ioctl -1071622585 [ 1639.804099] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1639.804113] do_mount+0x3c9/0x24f0 [ 1639.804129] ? copy_mount_string+0x40/0x40 [ 1639.831399] ? copy_mount_options+0x17d/0x2e0 [ 1639.835918] ? copy_mount_options+0x18f/0x2e0 [ 1639.840430] ? copy_mount_options+0x1ec/0x2e0 [ 1639.844948] ? copy_mnt_ns+0x8a0/0x8a0 [ 1639.848849] SyS_mount+0xa8/0x120 [ 1639.852595] ? copy_mnt_ns+0x8a0/0x8a0 [ 1639.856483] do_syscall_64+0x1d5/0x640 [ 1639.860377] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1639.865580] RIP: 0033:0x45eeca [ 1639.868759] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1639.876454] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1639.883712] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1639.890981] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1639.898280] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 19:08:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000020601000000000000000000000000000c000300686173683a69700005000400000000000900020073797a300000000005000500020000000500010006000000c9f7cfc255decc57ee7288e528a2643b2e53c2d52176da085dbeac86fcb5048b73f9c2d408a7c725427db058e8b361fc0b6c8fbcd0"], 0x44}}, 0x0) 19:08:14 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) pkey_alloc(0x0, 0x2) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:14 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1639.905595] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000037 19:08:14 executing program 3 (fault-call:3 fault-nth:56): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 19:08:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) 19:08:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x20, 0x1, 0x8, 0x201, 0x0, 0x0, {0x5, 0x0, 0x9}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4810}, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x4e24, 0x3, @empty, 0x6}, {0xa, 0x4e23, 0x9, @mcast2, 0x9}, 0xaa, [0x80000001, 0x338, 0x7bc0b548, 0x81, 0x1, 0x10000, 0x0, 0xfffffffb]}, 0x5c) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) ioctl$RTC_VL_READ(r5, 0x80047013, &(0x7f00000002c0)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_DATA, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xff5d, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x8040) 19:08:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50008, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) ioctl$KVM_S390_INTERRUPT_CPU(r3, 0x4010ae94, &(0x7f0000000140)={0x4, 0x7fff, 0x7}) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000100)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206010000000000000000000000000010000300686173683a61702c6d616300050004000000ec000900020073797a300000000005000500020000000500010006000000"], 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:14 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) read$fb(r2, &(0x7f0000000180)=""/55, 0x37) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000140)={0xa30000, 0x44a, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x980908, 0x34bc, [], @p_u8=&(0x7f0000000000)=0x1}}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffffffffffffc, r3, 0x3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x2b, 0x6, 0x9, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f00000002c0)={'gre0\x00', 0x1}) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:14 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/87, 0x57, 0x10000, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000080)={r4, 0x5, 0x7f}, 0x8) [ 1640.263893] FAULT_INJECTION: forcing a failure. [ 1640.263893] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1640.275753] CPU: 1 PID: 2545 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1640.283554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1640.292916] Call Trace: [ 1640.295516] dump_stack+0x13e/0x194 [ 1640.299151] should_fail.cold+0x10a/0x14b [ 1640.303322] __alloc_pages_nodemask+0x1bf/0x700 [ 1640.307999] ? find_held_lock+0x2d/0x110 [ 1640.312078] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1640.317100] ? find_held_lock+0x2d/0x110 [ 1640.321190] cache_grow_begin+0x7b/0x410 [ 1640.325254] kmem_cache_alloc+0x695/0x770 [ 1640.329446] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1640.334466] getname_kernel+0x4e/0x340 [ 1640.338374] kern_path+0x1b/0x40 [ 1640.341749] lookup_bdev.part.0+0x60/0x160 [ 1640.345990] ? blkdev_open+0x250/0x250 [ 1640.349887] blkdev_get_by_path+0x70/0xf0 [ 1640.354036] mount_bdev+0x4c/0x370 [ 1640.357582] ? hfs_show_options+0x570/0x570 [ 1640.361908] mount_fs+0x92/0x2a0 [ 1640.365316] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1640.369820] do_mount+0x3c9/0x24f0 [ 1640.373613] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1640.378632] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1640.383476] ? copy_mount_string+0x40/0x40 [ 1640.387712] ? __might_fault+0x177/0x1b0 [ 1640.391794] ? _copy_from_user+0x94/0x100 [ 1640.395940] ? copy_mnt_ns+0x8a0/0x8a0 [ 1640.399825] ? copy_mount_options+0x1ec/0x2e0 [ 1640.404318] ? copy_mnt_ns+0x8a0/0x8a0 [ 1640.408207] SyS_mount+0xa8/0x120 [ 1640.411801] ? copy_mnt_ns+0x8a0/0x8a0 [ 1640.415711] do_syscall_64+0x1d5/0x640 [ 1640.419623] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1640.424849] RIP: 0033:0x45eeca [ 1640.428041] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1640.437660] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1640.444928] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1640.452193] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1640.459457] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1640.466723] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000038 [ 1640.488400] Unknown ioctl -1071622583 [ 1640.506737] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 19:08:15 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)={0x88, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0xfc}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x38}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x8}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x3f}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x200}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1640.537263] Can't find ip_set type hash:ap,mac [ 1640.556665] Unknown ioctl -1071622583 19:08:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000323484000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f752c0c5b3eb1147749a3a2e4dd7d7e49d8ecac9e5a803e3709fd2993d2cf784c4e325329fbbfb878c8ef48e17c8325d501923777c851a948064878587425c06eac8135aaff2adf059798481b9017a7a64b53582323959f9353c0d4d159fcf43904b2776a3092c879c0d9d40ed7fde77dfe8096c3e20f34dafe5a8cb08cc022cdf54ac1d46424f51eb476ab045da17576ff184ded9fa395128bcc00ed8e4c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r1 = dup(r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000600)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000000)) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x64, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x3ff}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x64}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:15 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f00000002c0)={[0x1000, 0x6000, 0x6000, 0x5000], 0x7fff, 0x4, 0x6000000000000000}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000380)=0xe) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="48000005000000000000000000000000000003006d6163f204000400000000000900020073797a300000000005000500020000000500010006000000"], 0x48}}, 0x0) r2 = open(&(0x7f0000000340)='./file0\x00', 0x121000, 0x28) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f2, 0x100, 0x70bd27, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x40400a5) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:15 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0xaae5f56c1caee940, 0x70bd2c, 0x25dfdbfd, {0x1, 0x0, 0x0, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x15) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES64=0x0, @ANYRES64], @ANYRES16, @ANYRES64=r4]) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x1e0c) unshare(0x8020400) r5 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r5, &(0x7f0000000000)) 19:08:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="44000000020601000000000000000000000000000c000300686173683a6970000500040017000000000900020073797a300000000005000500020000000500010006000000"], 0x44}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000740)=ANY=[@ANYBLOB="010000000000000000000000f6b834cd85dd493f997e380a8a1ded7c91228070758faf63cc0b0c567a9de328f9cd55231416d2f7030ba710b957db46a9954805d5603d52173b7df56ba6faf28fd9ed259718ecd5f8cabe49bdeedad1bd833290cb127ad9bfe41f82b66c34eb258485494b83cfdc383042e302de2158e0ecf995bbd8d88007ae1a0f02bc8f02d5b2"]) getsockopt$inet6_dccp_buf(r4, 0x21, 0xc0, &(0x7f0000000640)=""/212, &(0x7f00000001c0)=0xd4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) sendmsg$NFT_MSG_GETRULE(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x7, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x7100) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000240)={0xa0, 0x0, 0x5, {{0x5, 0x1, 0x4, 0x88, 0x2, 0xfffffffc, {0x6, 0x3, 0x5, 0x4, 0x4c, 0x0, 0xa09, 0x10001, 0x5, 0x20, 0x1000, 0xffffffffffffffff, r5, 0x0, 0x7fff}}, {0x0, 0x2}}}, 0xa0) r6 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r6, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x60800, 0x0) ioctl$sock_inet_udp_SIOCINQ(r7, 0x541b, &(0x7f0000000800)) r8 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r8, 0x1, 0x1, &(0x7f0000000140), 0x4) r9 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r9, 0x1, 0x1, &(0x7f0000000140), 0x4) fsync(r9) fcntl$getown(r8, 0x9) connect$llc(r6, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r6, &(0x7f0000001380), 0x40003ad, 0x2000000) setsockopt$sock_void(r6, 0x1, 0x1b, 0x0, 0x0) [ 1640.737793] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1640.786072] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1640.799313] hfs: unable to change codepage [ 1640.805158] hfs: unable to parse mount options 19:08:15 executing program 3 (fault-call:3 fault-nth:57): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 19:08:15 executing program 5: perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x900000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffb, 0x800}, 0x40640, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="48000000020601000000000000000000000037000010000300686177567e1adfe073683a69702c6d61630005000400000000000900020073797a30000000000500050002000000050049704cc9b23119edc13a"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:15 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) io_setup(0x8, &(0x7f00000004c0)=0x0) r2 = socket(0x25, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000440)=[@in6={0xa, 0x4e23, 0x2, @empty, 0x3ff}], 0x1c) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x80) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2}]) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x141181, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) io_cancel(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x47, r5, &(0x7f0000000040)="a663d1", 0x3, 0x4, 0x0, 0x1, r6}, &(0x7f0000000240)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:15 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0x2000, 0x2, 0x2, 0x6}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 19:08:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000080)={r7}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r7, &(0x7f0000000200)=0x4) sendmmsg$inet_sctp(r2, &(0x7f00000002c0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x30d, @dev={0xfe, 0x80, [], 0x2c}, 0x4a}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000100)="4d657de64075e505", 0x8}, {&(0x7f0000000140)="617b9cca815e77eff3eb403621c58633c5668da0491043fba65e9744e83972239538ee5597c854f52c87be76b7d53941", 0x30}], 0x2, &(0x7f0000000240)=[@sndrcv={0x30, 0x84, 0x1, {0x9, 0x3, 0x200, 0x10001, 0x8, 0x1f, 0x800, 0x0, r8}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x10000}}, @authinfo={0x18}], 0x60, 0x4080}], 0x1, 0x8010) unshare(0x8020400) r9 = mq_open(&(0x7f00000000c0)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r9, &(0x7f0000000000)) [ 1640.909703] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1640.928113] FAULT_INJECTION: forcing a failure. [ 1640.928113] name failslab, interval 1, probability 0, space 0, times 0 [ 1640.951278] CPU: 1 PID: 2597 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1640.959159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1640.968521] Call Trace: [ 1640.971150] dump_stack+0x13e/0x194 [ 1640.974853] should_fail.cold+0x10a/0x14b [ 1640.979017] ? set_bdev_super+0x110/0x110 [ 1640.983176] should_failslab+0xd6/0x130 [ 1640.987169] kmem_cache_alloc_trace+0x2db/0x7b0 [ 1640.988139] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1640.991841] ? lock_downgrade+0x6e0/0x6e0 [ 1640.991872] ? set_bdev_super+0x110/0x110 [ 1640.991879] sget_userns+0x102/0xc30 [ 1640.991886] ? set_bdev_super+0x110/0x110 [ 1640.991897] ? ns_test_super+0x50/0x50 [ 1640.991906] ? set_bdev_super+0x110/0x110 [ 1640.991912] ? ns_test_super+0x50/0x50 [ 1640.991920] sget+0xd1/0x110 [ 1640.991932] mount_bdev+0xcd/0x370 [ 1640.991939] ? hfs_show_options+0x570/0x570 [ 1640.991952] mount_fs+0x92/0x2a0 [ 1640.991964] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1640.991976] do_mount+0x3c9/0x24f0 [ 1641.050824] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1641.055849] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1641.060689] ? copy_mount_string+0x40/0x40 [ 1641.065032] ? __might_fault+0x177/0x1b0 [ 1641.069098] ? _copy_from_user+0x94/0x100 [ 1641.073237] ? copy_mnt_ns+0x8a0/0x8a0 [ 1641.077117] ? copy_mount_options+0x1ec/0x2e0 [ 1641.081616] ? copy_mnt_ns+0x8a0/0x8a0 [ 1641.085490] SyS_mount+0xa8/0x120 [ 1641.088926] ? copy_mnt_ns+0x8a0/0x8a0 [ 1641.092813] do_syscall_64+0x1d5/0x640 [ 1641.096702] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1641.101892] RIP: 0033:0x45eeca [ 1641.105077] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1641.112776] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1641.120036] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1641.127333] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1641.134595] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1641.141884] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 0000000000000039 [ 1641.188649] audit: type=1326 audit(1583435295.648:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2601 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0x7ff00000 [ 1641.228760] audit: type=1326 audit(1583435295.648:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2601 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x415f51 code=0x7ff00000 [ 1641.284920] audit: type=1326 audit(1583435295.648:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2601 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x415f51 code=0x7ff00000 [ 1641.320440] audit: type=1326 audit(1583435295.648:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2601 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=231 compat=0 ip=0x45c479 code=0x7ff00000 19:08:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x88, 0x4, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x8}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xe36}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x20, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bond\x00'}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x44a83260}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffd}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000}, 0x800) 19:08:15 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x24, 0x4, 0x6, 0x8, 0xff, 0x1}) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r1 = gettid() r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000080)=0x3) rt_tgsigqueueinfo(r1, r2, 0x19, &(0x7f0000000200)={0x1f, 0x7, 0x1}) 19:08:15 executing program 3 (fault-call:3 fault-nth:58): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 19:08:15 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x279) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1641.534581] FAULT_INJECTION: forcing a failure. [ 1641.534581] name failslab, interval 1, probability 0, space 0, times 0 [ 1641.578507] CPU: 0 PID: 2620 Comm: syz-executor.3 Not tainted 4.14.172-syzkaller #0 [ 1641.586364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1641.595883] Call Trace: [ 1641.598534] dump_stack+0x13e/0x194 [ 1641.602206] should_fail.cold+0x10a/0x14b [ 1641.606373] ? set_bdev_super+0x110/0x110 [ 1641.610538] should_failslab+0xd6/0x130 [ 1641.614529] kmem_cache_alloc_trace+0x2db/0x7b0 [ 1641.619213] ? lock_downgrade+0x6e0/0x6e0 [ 1641.623506] ? set_bdev_super+0x110/0x110 [ 1641.627668] sget_userns+0x102/0xc30 [ 1641.631390] ? set_bdev_super+0x110/0x110 [ 1641.635554] ? ns_test_super+0x50/0x50 [ 1641.639451] ? set_bdev_super+0x110/0x110 [ 1641.643610] ? ns_test_super+0x50/0x50 [ 1641.647513] sget+0xd1/0x110 [ 1641.650566] mount_bdev+0xcd/0x370 [ 1641.654291] ? hfs_show_options+0x570/0x570 [ 1641.658629] mount_fs+0x92/0x2a0 [ 1641.662017] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1641.666624] do_mount+0x3c9/0x24f0 [ 1641.670181] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1641.675210] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1641.675390] Unknown ioctl 22026 [ 1641.680060] ? copy_mount_string+0x40/0x40 [ 1641.680072] ? __might_fault+0x177/0x1b0 [ 1641.680084] ? _copy_from_user+0x94/0x100 [ 1641.680090] ? copy_mnt_ns+0x8a0/0x8a0 [ 1641.680099] ? copy_mount_options+0x1ec/0x2e0 [ 1641.680106] ? copy_mnt_ns+0x8a0/0x8a0 [ 1641.680116] SyS_mount+0xa8/0x120 [ 1641.711742] ? copy_mnt_ns+0x8a0/0x8a0 [ 1641.715657] do_syscall_64+0x1d5/0x640 [ 1641.719574] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1641.724910] RIP: 0033:0x45eeca [ 1641.728108] RSP: 002b:00007f760d17aa68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1641.735885] RAX: ffffffffffffffda RBX: 00007f760d17b6d4 RCX: 000000000045eeca [ 1641.743170] RDX: 00007f760d17aae0 RSI: 0000000020000280 RDI: 00007f760d17ab00 [ 1641.750449] RBP: 000000000076bf20 R08: 00007f760d17ab40 R09: 00007f760d17aae0 [ 1641.757735] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 1641.765018] R13: 0000000000000bdc R14: 00000000004cdbbf R15: 000000000000003a 19:08:16 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000140)={0x6, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x40000, 0x0) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x5, 0x3ff, 0xff, 0xfffffff8], 0x4, 0x80000, r1, r4}) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:16 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x23c, r2, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xe3a}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1f}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x800}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xb8c9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}]}]}, @TIPC_NLA_NET={0x6c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x40000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff0001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x41}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_SOCK={0x64, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xe0}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8001}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x76df}]}, @TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x800}, 0x0) [ 1641.785577] audit: type=1326 audit(1583435296.248:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2601 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f2ba code=0x7ff00000 [ 1641.872638] audit: type=1326 audit(1583435296.248:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2601 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x415f51 code=0x7ff00000 19:08:16 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x424, 0x3f4, 0x800, 0x70bd26, 0x25dfdbff, {0x1, 0x1, 0x3b, [0xfff, 0x8, 0x0, 0x8, 0x8000, 0xffffffff, 0x3, 0x3, 0x8, 0x8, 0x1000, 0x674521b7, 0xf6, 0x80, 0x8, 0x3ff, 0x200, 0x7fffffff, 0x4, 0xd5, 0x8, 0xc13, 0xffffffc1, 0x2, 0x10001, 0x7f, 0x82, 0x3, 0x6, 0x1c30, 0x1f, 0x2, 0x2, 0x7, 0xfff, 0x2, 0xfffff800, 0x57, 0xbd, 0x8, 0x0, 0x0, 0x0, 0x7, 0x6, 0x1, 0x7ff, 0x0, 0x7, 0xf2, 0xffff, 0x80000000, 0x6, 0x1, 0x8, 0x1, 0x7, 0x3f, 0x9, 0x35000, 0x0, 0x4, 0x40, 0x200], [0x7, 0x9e4, 0x1, 0x9, 0x400, 0x2, 0x0, 0x7, 0xfffffffd, 0x4, 0x0, 0x9, 0xffffffff, 0x5, 0x7ff, 0x212, 0x7, 0x9, 0x6, 0xa0, 0x64, 0xeb1, 0x7, 0x55e4, 0x3, 0x7fff, 0x42a, 0x8, 0x8, 0xad40, 0x67ac0, 0x3, 0xffffffff, 0x5a, 0x5, 0xa9, 0x9, 0x2, 0x6, 0x5, 0x6, 0xdab, 0x400, 0xfff, 0xb86b, 0xffffffa2, 0x1, 0x7, 0xbf, 0x400, 0x9, 0x2, 0x7, 0x401, 0x100, 0x3, 0x0, 0x1, 0x0, 0x20, 0x0, 0xffffffff, 0x6, 0x84], [0x7, 0x70, 0x1, 0x1, 0x1, 0x9, 0x8000, 0x72, 0x40000000, 0x0, 0x2b4, 0xffff, 0x2a, 0x3, 0x7fff, 0x3, 0x5, 0xfffffffb, 0x1, 0x3ff, 0x8001, 0x401, 0xffff, 0x2, 0x7fffffff, 0x6, 0x5b, 0x1ff, 0x20, 0x36c8799f, 0x2, 0x0, 0xfffffffd, 0x5, 0x6, 0x3, 0x6, 0x5, 0x3f, 0x5, 0x5, 0x8, 0x3, 0x7f, 0x9, 0xfa88, 0x0, 0x400, 0xffffffff, 0x1000, 0xffff, 0x800, 0x0, 0xb38, 0x6, 0xfff, 0x8, 0x6, 0x0, 0x6a, 0xfff, 0x2, 0x0, 0x7], [0x3, 0x4, 0x7, 0xfffffff8, 0x5, 0x800, 0x5, 0x6e6c, 0x4, 0x7fffffff, 0x6, 0x3ff, 0x1, 0x5, 0xfff, 0x9342, 0x0, 0xfffffff7, 0x0, 0x4, 0x8cb, 0x61c0, 0xd5b, 0x6, 0x3, 0x7f, 0x7ff, 0xcc1, 0xf99, 0x6, 0xd1, 0xfffffe01, 0x1000, 0xadb3, 0x7, 0x139, 0x1f, 0x0, 0x1, 0xee, 0x562a, 0x8, 0x3, 0x5, 0x2, 0x5, 0x400, 0x6, 0x7, 0xf600000, 0x7, 0x9, 0x8, 0x2, 0x9, 0x0, 0x5, 0x9, 0x6, 0x8001, 0x0, 0x7, 0x9a27, 0x3], 0x2, ['!\x00']}, ["", "", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x895}, 0x80) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r1 = dup(r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1641.989485] audit: type=1326 audit(1583435296.248:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2601 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x415f51 code=0x7ff00000 19:08:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0x1f8000000) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000000c0)) 19:08:16 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4010, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4001, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000040)={0x5}) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:16 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x1, 0x0, 0x7, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000000)={0x0, 0x2, 0x7, 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x7}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000040)={0x3, 0xe6, &(0x7f0000000240)="25f6782545cddc76711d604f80b04409d6c963396357563ad1a620de1040064159bd9c2bb034ee022e8779d9db829b13d8d481f791f247c64975eb93a7b1de99ac63cb94f1cdec70583d126f819fb4ffdaf6019828eb483402c653d40978de1a3184c492a119c49fa1d098ce533a42bc176bf030945abc3c973d0604dcd7556262893d8ce0751522539877ceb43a33ff91ce8055f7b1e9b7df7b4db580cec048d2a9e701b7415bda993b56b3cbe0af246c9044f58047248908573250cda7fe6ecc1f92e8bcafde18028a2601fbba43ce488ec43088639647c3caed13507970821ced0a42f485"}) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1642.104364] audit: type=1326 audit(1583435296.248:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=2601 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=231 compat=0 ip=0x45c479 code=0x7ff00000 19:08:16 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000140)={0xc546, 0xb26, &(0x7f00000002c0)="1d9aeaf3a4c33d66d82c429f84abffd40d636b2fa903587b2d2e0ea3144b5adc4be103f3db748f9598cd773a93c8547a4e02060eda391cbf6c2b62c1b3688f7c043abd313b0b4de01b3e7684d081a463a4ebac845f41eacfe0dcc14b06afcce2cc5084ed1a40b9af3451b1b8dd39f29c77d2bf2d56681c43e831f74e815f6cf9b1bba659279b775b3ba99e81b61384d19194bfce3b0601fa63a267fb497df9d6c18bd6ebd68f4c1765", &(0x7f0000000040)="a986603c296518e399b2fb33c45abd96bd23", 0xa9, 0x12}) [ 1642.183363] Unknown ioctl 43785 19:08:16 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40484}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1642.269390] Unknown ioctl 43785 19:08:16 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0xfffc, @fixed={[], 0x11}, 0x8}, 0xe) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1, 0x1) write$P9_RSYMLINK(r1, &(0x7f0000000100)={0x14, 0x11, 0x1, {0x80, 0x4, 0x8}}, 0x14) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000200)={"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"}) socket$can_bcm(0x1d, 0x2, 0x2) 19:08:16 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0xfe4f, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:16 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x7) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x48}}, 0x0) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000140)=""/67, &(0x7f0000000040)=0x43) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r2, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x40003ad, 0x2000000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r3 = openat$cgroup_ro(r1, &(0x7f0000000400)='cpuset.effective_mems\x00', 0x0, 0x0) mq_notify(r3, &(0x7f0000000000)={0x0, 0x4, 0x3}) 19:08:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2000c004}, 0x4000001) [ 1642.449454] Unknown ioctl 22026 [ 1642.499182] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:08:17 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000000206010000000000000000000000000010000300686173683a69702c6d61630005000400000000000900020073797a300000000005000500020000000500010006000000ea561fbc85f9d66495d37d80b8bc2596ac0c79009685fb2878c20d417575bf2ec8668437ddec8286d409cdc3fb9348cbe57f023c797466a130303d75557c44e80ab2f89fb216059752"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x90800, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0x9) [ 1642.553796] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1642.578772] hfs: unable to load codepage "cp8?" [ 1642.583649] hfs: unable to parse mount options [ 1642.621435] Unknown ioctl 21545 [ 1642.679130] Unknown ioctl 21545 [ 1642.681247] hfs: unable to load codepage "cp8?" [ 1642.687217] hfs: unable to parse mount options 19:08:17 executing program 3: r0 = socket$inet6(0xa, 0xa, 0x40) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 19:08:17 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r2, &(0x7f0000000140)="580c4ac54a7a5837e4b396f4436ae09f81e859211d4fcc009fb1f49c9621b601224d69044c37635e6554406a93c80d9b3b1b1f72d44a6f22ec1616423f9aa982a954e69c7a5e13024f7a9613adb18c318922f972a6a3cf894b660c9ea8fa3d3d982e77697220bc", &(0x7f0000000240)=""/54}, 0x20) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, "c4c8c0b93c85471e", "0efe676975f3e5b7e5668baaa0712042", "7a9b787a", "8f28b2bd132c6052"}, 0x28) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:17 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/dlm-control\x00', 0x270e42, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0x7, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x4, 0x74bd2c, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c844}, 0x4000804) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x24, r2, 0x20, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x80000000}}, ["", ""]}, 0x24}}, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x37}}, r5}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000440)={0x9, 0x108, 0xfa00, {r5, 0xfc, "66cf1d", "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"}}, 0x110) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000002060100000007000000000000000000100003993f49e9683a69702c6d616300050004000000000009d81d0073797a30000000000500050002ff00000500010006000000"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1642.835805] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 19:08:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x60200) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)={0x1, 0x6fe0}) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = getpid() mq_notify(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, @tid=r3}) 19:08:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x401}, 0x0, 0x0, 0x86}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xffe}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) fgetxattr(r2, &(0x7f0000000000)=@random={'trusted.', 'ppp0\x00'}, &(0x7f0000000140)=""/70, 0x46) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:17 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) sendmsg$AUDIT_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x3e8, 0x4, 0x70bd2c, 0x25dfdbfb, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x808042, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) mmap$snddsp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xac4a2cf35e87d97f, r2, 0x7000) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$VIDIOC_G_ENC_INDEX(r3, 0x8818564c, &(0x7f00000003c0)) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000240)={0x1000, 0x0, 0x3, 0x1, 0x7}) [ 1642.962488] hfs: unable to change codepage [ 1642.977725] hfs: unable to parse mount options [ 1643.005271] Unknown ioctl -2011670964 [ 1643.024339] Unknown ioctl -2011670964 19:08:17 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000000)='./file0/bus\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x80000, 0x0) exit(0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r1 = dup(r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000600)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 19:08:17 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x404800) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r3, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) sendto$packet(r1, &(0x7f0000000140)="1490222d5c492234f2de04fca7f5498881963defedb9d79cd275c9e62d48dff4d468f77cf77c4c554e28da879c57f484bd80d5dc4c00294b9c37aa630a2b1bd25ec30a8b5fc2965b3c880b92e33e61ea53a4ef54cff1ca13f5", 0x59, 0x24042014, &(0x7f0000000040)={0x11, 0x5, r3, 0x1, 0x5, 0x6, @random="912ca0586159"}, 0x14) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x4090) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r1 = dup(r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000600)) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000040)=0x3) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) mkdirat(r2, &(0x7f0000000000)='./file0\x00', 0x20) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206010000000700000000000000000010000300686173683a69702c6d61630005000400000000000900020073797a300000000005000500020000000500010006000000"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x7, 0x101, 0x0, 0x0, {0x3, 0x0, 0x8}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x5}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xbbd}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20040000) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '!\'selinux@'}}]}) 19:08:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) fallocate(r0, 0x1, 0x6, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2b, 0x6, 0x52) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f00000001c0)=0x6) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000180)=0x3, 0x4) unshare(0x8020400) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fef7ff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e4910a000000000000d4ed88b37ab8d7674cf84dca2fea63f0501ceebf572938231f32b879914fe8a3dfcf9591d209c9d952d341c55134dd18c7fc15a0b9e4f074879b0663fd9cf05ad6"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640)='batadv\x00') r7 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$BATADV_CMD_GET_DAT_CACHE(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="b70008000300", @ANYRES32=r8, @ANYBLOB], 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r6, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) r9 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r9, &(0x7f0000000000)={0x0, 0x0, 0x4}) 19:08:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r3, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', r3}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) r5 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r5, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000001}, 0x4080) sendmsg$NLBL_CALIPSO_C_LIST(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r5, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x24048884) [ 1643.519123] nla_parse: 1 callbacks suppressed [ 1643.519167] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1643.556299] hfs: unable to parse mount options 19:08:18 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r1 = dup(r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000600)) read$fb(r1, &(0x7f0000000000), 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x7b9, &(0x7f0000000040)) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000380)) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r3, &(0x7f0000000140)="b6dba82ab0229aa3b7d2566afe51922c1fce2f057572458f7fa691fa19a6e0612d9059a72eb97e6202f2e32d1fd8443a198418ae673f0f65fa9d8145bf367985ed70b791ca50968ff607888f345b90b28f426afe9bf72725", &(0x7f0000000280)=""/145, 0x4}, 0x20) [ 1643.678452] hfs: unable to parse mount options [ 1643.739670] Unknown ioctl -2138001791 19:08:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) r1 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000010c0)={0xe, {0x6, 0x2, 0x6a, 0x1000, "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"}}, 0x100c) 19:08:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'macceltic'}}]}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0xa) [ 1643.808037] Unknown ioctl -2138001791 19:08:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000140)={0xa10000, 0x2, 0x400, r0, 0x0, &(0x7f0000000040)={0x9a0913, 0xdc, [], @p_u16=&(0x7f0000000000)=0x1000}}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000008}, 0x0, 0x0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) [ 1643.877284] hfs: unable to change codepage [ 1643.883406] hfs: unable to parse mount options 19:08:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f00000001c0)) r6 = accept(r3, &(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, &(0x7f0000000100)=0x80) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x0, 0xc, 0x4, 0x0, 0x800, {0x0, 0x7530}, {0x4, 0x0, 0x3, 0xe6, 0x4, 0xb7, "c2935cc5"}, 0x209, 0x1, @fd, 0x8, 0x0, r6}) mq_notify(r2, &(0x7f0000000000)) 19:08:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x34, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) 19:08:18 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$SOUND_MIXER_READ_STEREODEVS(r1, 0x80044dfb, &(0x7f0000000000)) 19:08:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getpeername$l2tp6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 19:08:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="44000000020601000000000000000000000000000c000300686173683a69700005000400000000000900020073797a300000000005000500020000000500e6df42030000"], 0x44}}, 0x0) 19:08:18 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x14, r3, 0xc91add0bf88807dd, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x60, r3, 0x300, 0x70bd27, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x60}, 0x1, 0x0, 0x0, 0x48000}, 0x4004010) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:18 executing program 4: unshare(0x8000400) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x1ff, 0x101, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x990afa, 0x1, [], @p_u8=&(0x7f0000000000)=0xf5}}) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000100)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0/bus\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) 19:08:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) 19:08:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x5d, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000000206010000000000a2000000000000000c0003006861730000c00f0000000000000000000919020073bec41a6c00698bd4392c9587aed90000050005000200000005000100064c2265499d44fbcd8793d919cc95310b309608748d1cfe7b9d8d1f5fc20425cf462f92fdda1baeed673f100f74552737f186b256be26e86c2fccaa3176c91787b8e7725f1460678c5d124bbf573fc1809689e0493261fa780046dd29e88c74465c62cc4aeb19000000000000003fb2c4a0d24083f8dac81cb12544ac2b56feb6ff10199992f66887e85ce00b0d3f755c88f3f1eb686e9d505eec66e20100681e5c9b65d2"], 0x1}, 0x1, 0x0, 0x0, 0x844}, 0x95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f0000000000)=0x20) [ 1644.478946] hfs: unable to change codepage [ 1644.494226] hfs: unable to parse mount options 19:08:19 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x80010, r0, 0x218eb000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r3, 0x0) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-14'}}, {@umask={'umask', 0x3d, 0x5c}}, {@file_umask={'file_umask', 0x3d, 0x1ff}}, {@uid={'uid', 0x3d, r3}}]}) 19:08:19 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r1 = dup(r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000600)) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x54, 0x2, 0x7, 0x3, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9ca}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8b91}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x5}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0xc1}, 0x90) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000300)=0x54) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r3, 0x80184151, &(0x7f00000002c0)={0x0, &(0x7f0000000c00)="9a3d8c9238534eaf38e11ed58c5c74bf380f64acbe4361f27d6e10254f4351fe80dc6e1ca42fbd25e378237ecda0048220846895811e2190818053fd0cf54f0871976e3f922acb13eb9b53eb723b9c2ba4e75f00000000800000001dd3f3d91c96e3773e04fb5fd32746fb02f030cc238b0f4d20bb730851cdf07bbd18f82cfbd356b284857bebeec01cdc3e5f4968200a07cd7d15e0020a3922acb0727e09c7452f73cc1b5dd42a53f87ebd1a21a3af9bc1a0b60536e5d0e2711cdfdc15fbbe4d491be754ebeee10ce9a2b17774a9bd9411ae7a5574", 0xd6}) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r9, 0x84, 0x0, &(0x7f0000000080)={r11}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r11, 0x7}, 0x8) 19:08:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000040206010020000000000000000000000010000300686173683a69702c6d61630005000400000000000900020073797a300000000001000600"/72], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x3f}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x5}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x20040080}, 0xe959a4f12f19f2c5) r1 = syz_open_dev$admmidi(&(0x7f0000001ac0)='/dev/admmidi#\x00', 0x80000000, 0x2000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) write$P9_RWSTAT(r2, &(0x7f00000000c0)={0x7, 0x7f, 0x1}, 0x7) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYPTR], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x5) setsockopt$inet6_mtu(r1, 0x29, 0x17, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000140)=0x10) 19:08:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r4, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x0, 0x2710}, {r5, r6/1000+30000}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r7 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r7, 0x2289, &(0x7f0000000600)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r7, 0x9}, 0x10) [ 1644.701763] hfs: unable to change codepage [ 1644.714884] Unknown ioctl -2145894063 [ 1644.715012] hfs: unable to parse mount options 19:08:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) write$6lowpan_enable(r1, &(0x7f0000000040)='0', 0x1) [ 1644.768696] Unknown ioctl -2145894063 19:08:19 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x22000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x60, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x1}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x6}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000000)) 19:08:19 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r2, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000000)={@loopback, 0x4e, r2}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1644.856459] hfs: unable to change codepage [ 1644.872235] hfs: unable to parse mount options [ 1644.934546] Unknown ioctl 35126 [ 1645.015655] Unknown ioctl 35126 19:08:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001400)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000001500)=0xe8) connect$packet(r3, &(0x7f0000001540)={0x11, 0x5, r4, 0x1, 0x0, 0x6, @remote}, 0x14) connect$l2tp6(r1, &(0x7f0000000040)={0xa, 0x0, 0x7, @mcast2, 0x20, 0x2}, 0x20) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x1000, 0x81, 0x3ff, 0x4, 0x54]}, 0xe) 19:08:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="44000000020601000000000000000000000000000c000300686173683a69700005000400000000000900020073797a3000000000050005000200000005000100060000000b45a5bc4ceec99472e21789ea6086cd2b48ebb6ad15dbe69a5ce5526d61c1d1e6b02660a4953ab31ba36c5339ac816c0680c1fff3706cc948dbaf84a2e72d54a903fbdd3a3894445be8d20808e5cc1a99b2550cb7fcb2498bb56d412fdac5970d2fcbc66b20d0b704bd9cae2d61ee368417d17554bb6cb40799b036c47948"], 0x44}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x10080, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000380)) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000280)=r2) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x70, 0x2, 0x6, 0x201, 0x0, 0x0, {0x7}, [@IPSET_ATTR_DATA={0x5c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x4}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast2}}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x200}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x1}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x20}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast2}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40081}, 0x40080) socket$bt_hidp(0x1f, 0x3, 0x6) 19:08:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000240)={0x101, [[0x7, 0x1, 0x7f, 0xb19, 0x7ff, 0x4, 0x0, 0xfffffffc], [0x9, 0x0, 0x6, 0xffffff80, 0x45, 0xfff, 0x1000], [0x1, 0x3f, 0xffffffff, 0x9, 0x1, 0x8001, 0x7, 0x2cb]], [], [{0x80000001, 0x9, 0x1, 0x1, 0x0, 0x1}, {0x80, 0x7, 0x0, 0x1, 0x0, 0x1}, {0x9, 0x200, 0x1, 0x1, 0x1}, {0xfffffc00, 0x2, 0x1, 0x1, 0x1, 0x1}, {0x490, 0x5, 0x0, 0x1, 0x1}, {0x0, 0xbaa, 0x1, 0x1}, {0xffffff6b, 0x9, 0x0, 0x1, 0x1}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x1}, {0x3, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x9, 0x1, 0x0, 0x1}, {0x6, 0x1f, 0x0, 0x0, 0x1}, {0x1, 0x101, 0x1, 0x1, 0x1}], [], 0x3}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:19 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x45, r4, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x22, 0x1, r3}, {0x2d}}]}, 0x58}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r6, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r8, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r11, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r12, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r13, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r14, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r15, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r16, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)={'batadv0\x00', r16}) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @can, @llc={0x1a, 0x0, 0x7, 0x41, 0x7f, 0x7, @local}, @xdp={0x2c, 0x3, 0x0, 0xe}, 0x20, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000300)='veth0_to_bridge\x00', 0x456, 0x2, 0x2}) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) r20 = socket(0x11, 0x800000003, 0x0) bind(r20, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r20, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r21, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000740)={'wg2\x00', 0x0}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000007c0)=0x0, &(0x7f0000000800)=0x4) r24 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r24, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r24, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r24, &(0x7f0000001380), 0x40003ad, 0x2000000) r25 = socket(0x11, 0x800000003, 0x0) bind(r25, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r25, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r26, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r24, 0x8933, &(0x7f0000000840)={'vxcan1\x00', r26}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @dev, @initdev}, &(0x7f00000008c0)=0xc) r29 = socket(0x11, 0x800000003, 0x0) bind(r29, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r29, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r30, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r31 = socket(0x11, 0x800000003, 0x0) bind(r31, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r31, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r32, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r33 = socket(0x11, 0x800000003, 0x0) bind(r33, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r34 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x200000, 0x0) getsockname$packet(r34, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r35, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r36 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@ipx={0x4, 0xfb8, 0x100, "008f00005000", 0x9}, 0x80) getsockname$packet(r36, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r37, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000940)=0x14, 0xb63d1e60c23d5d27) r39 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r39, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r39, 0x29, 0x22, &(0x7f0000000980)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) r41 = socket(0x11, 0x800000003, 0x0) bind(r41, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r41, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r42, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b00)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001500)=0x14) r46 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r46, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r46, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) r48 = socket(0x11, 0x800000003, 0x0) bind(r48, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r48, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r49, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r50 = socket(0x11, 0x800000003, 0x0) bind(r50, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r50, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r51, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001f80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001f40)={&(0x7f00000028c0)=ANY=[@ANYBLOB="c8080000", @ANYRES16=r4, @ANYBLOB="000128bd7000fddbdf250000000008000100", @ANYRES32=r6, @ANYBLOB="b800028038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400050000003c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=r8, @ANYBLOB="e801028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000800000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040007000000080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000100010040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400feffffff08000600", @ANYRES32=r10, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r12, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000005000300030000000800040055020000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000300000008000600", @ANYRES32=r14, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r18, @ANYBLOB="3c0002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r19, @ANYBLOB="08000100", @ANYRES32=r21, @ANYBLOB="380102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r22, @ANYBLOB="080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r23, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r27, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400ff01000008000600eaa6b7b9c37232dbfb2885", @ANYRES32=r28, @ANYBLOB="08000100", @ANYRES32=r30, @ANYBLOB="7c00028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004006635000008000600", @ANYRES32=r32, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000500000008000100", @ANYRES32=r35, @ANYBLOB="f400028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000f32000008000600", @ANYRES32=r37, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000005000300050000000900040068617368000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r38, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r51, @ANYBLOB="08000100", @ANYRES32=r40, @ANYBLOB="ec0102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r42, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040003000000080007000000000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400020000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r43, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000700000008000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r44, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040001000000080007000000000008000100", @ANYRES32=r45, @ANYBLOB="8000028038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400e5a75b1844000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b000000140004003900910405000000070003023f00000008000100", @ANYRES32=r47, @ANYBLOB="7c0002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r49, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e0000"], 0x8c8}, 0x1, 0x0, 0x0, 0x4010}, 0x40000) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r3, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r3, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x40003ad, 0x2000000) sendfile(0xffffffffffffffff, r3, &(0x7f0000000080)=0x20000, 0x1f) mq_notify(r2, &(0x7f0000000000)) 19:08:19 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) chdir(&(0x7f0000000100)='./file0/bus\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0xfffffff2, 0xb, 0x4, 0x0, 0x80000000, {0x0, 0x2710}, {0x3, 0x0, 0x0, 0x1c, 0xea, 0x7f, "7d183165"}, 0x5, 0x4, @fd, 0x8000, 0x0, r0}) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) exit(0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) 19:08:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/nvram\x00', 0x200680, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) sendmsg$RDMA_NLDEV_CMD_GET(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x1401, 0x300, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000c00)=0x6, 0x4) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="480000000006010000000000000000000000000010000300686173683a69702c6d61630005000400000000000900020073797a300000000005be5bd485980b655c2400b184005f78d7919b13e005010006000000"], 0x48}}, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1645.405579] hfs: unable to change codepage [ 1645.422872] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1645.434989] hfs: unable to parse mount options 19:08:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$smc(&(0x7f00000000c0)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x98, r2, 0x403, 0x70bd2a, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond_slave_0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'lo\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x98}, 0x1, 0x0, 0x0, 0x2}, 0x20008000) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}]}, 0x50}}, 0x0) [ 1645.475081] Unknown ioctl 35123 [ 1645.514927] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1645.536486] hfs: unable to change codepage [ 1645.541368] hfs: unable to parse mount options 19:08:20 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x68201, 0x142) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[]}}, 0x0) 19:08:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000140), 0x4) r3 = socket$caif_stream(0x25, 0x1, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x101100, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$binfmt_script(r3, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'hfs\x00'}, {0x20, 'hfs\x00'}, {0x20, 'hfs\x00'}, {0x20, 'hfs\x00'}, {0x20, '&cpuset'}, {0x20, 'hfs\x00'}, {0x20, '],'}, {0x20, 'hfs\x00'}, {0x20, '#!vmnet1'}], 0xa, "9c51e3"}, 0x40) sync_file_range(r2, 0x55, 0x8, 0x4) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f64656167653d523835372c636f64cc926ec6bd3f86b34d8b8c8fb977ef8e4309a6fba5f139d8b6cb4cc3791c508b4cef7c0000000055a09e355659d0b08775b95885055a2be93b98efd3191da1839162e78622157b58edc7d2a370431141cc243513250af07b263a38dadd05639a45ca44c64d8b3c48ccb50a44ec2af8f2ed2dfd2a6dbba2b5e8872128d333ffe3f66dd6b0bef500"/166]) [ 1645.569550] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 19:08:20 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x940, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="48000000020601fb3eeab37f1d0000000000000000000000000010000300686173683a69702c5261630005000400000000000900020073797a300000000005000500020000000500e20006000000aeadc88f4bda"], 0x48}}, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x111, @time={0x8, 0x58d768e2}, 0x40, {0x7}, 0x0, 0x1, 0x1}) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0x20000) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000001c0)='./file0\x00', 0xb58, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000200)="8b494f4056a3b794629b31ebddb0abda3f985e9714c19baa8fb8fcf49efbbf1e1000114a9389c2afb29c2bd3a0529400f0338e233a60721f15877418f6b62ca8361ab7737a1f71672183d116b12a7799ab8983155a2f88c5c3f0a5dbd3b2fd4e5e8f70bfc05673fa525fce19452cd7168ba604ae2317127c5c824024223c5c88b6a6a760dcc2fb58b599e2f274502dcbb4eb6f", 0x93, 0x5ba}, {&(0x7f00000002c0)="e77e50f025801570374f2b4ab963a46a64bd67cf6048398497b06db6c3f86cf69931f4c022cf4801f38cef88f9d8bbdce90d4e1b9f6b0c1fe574d86d62b8c50aca85e938507ed70bc849a80ed567ec", 0x4f, 0xffffffff}, {&(0x7f0000000340)="48fb29d07f9d7a8763c58d2938788c1ef926a0300bee4ff4535975cc469fe2fb989d17d28c91f038be1ecdf77b34eaae0791532d176e635ab6408ee03759b1f20f4a12c5cd6127ba1fe42f488794e317bef8b956efacd851a35ed39dc9ce686e26c843ba", 0x64, 0x4}, {&(0x7f00000010c0)="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", 0x1000, 0x8001}], 0x1000, &(0x7f0000000440)={[{@nr_inodes={'nr_inodes', 0x3d, [0x25, 0x74]}}, {@size={'size', 0x3d, [0x2d, 0x74, 0x6b]}}, {@mpol={'mpol', 0x3d, {'default', '=relative', @void}}}, {@huge_never={'huge=never', 0x3d, '!#mime_typeposix_acl_access$em0wlan0trusted\xc2'}}, {@nr_inodes={'nr_inodes', 0x3d, [0x31]}}], [{@context={'context', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@seclabel='seclabel'}]}) 19:08:20 executing program 2: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x1800) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x8) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x9, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) setsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f00000001c0)="fd83a419971c10c6050fcc9648c5a102a6092e272d96db8790bb7bf5b2dafa500ca82c1168741a7b36a04c9bcac93f03ce8532056d34de1136b743d2058c2548df740591e6c485b67a153e03b3e322202ff4f59c14864a782a09a8d9c9d03aecef40a0a1803c5859c9b8d62783501b752c34b850dcd53da6bda9c441c929a9e2db1e311a02aa85e80b91c2e8e58d1a0415fae524bfc42840311e4a85aac7aa2a6db4f402024e20e9e12ee140374e49a2937ba5335188224867e7d0c79e3c06f3f812291500c5878ada3973a50fec96", 0xcf) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYRESHEX=0x0, @ANYRESDEC=r1], 0x2}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1645.685821] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.5'. 19:08:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) sendmsg$IPSET_CMD_ADD(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x9c, 0x9, 0x6, 0x606, 0x0, 0x0, {0x7, 0x0, 0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_ADT={0x40, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x9c}, 0x1, 0x0, 0x0, 0x48800}, 0x20000010) setsockopt$inet6_dccp_buf(r0, 0x21, 0xd, &(0x7f0000000380)="f72710f5a200ca6be355fe8c7b7d5245106800df8012ecb9abc69b5b06d8cae6ae5294935b8f354050b2854d95dff6e0ef36ee75dff9ab47f2b8a2f3651e19020947911640118aa3b24a57fe5d815db4d4493966ef565c53d73d6f9c36cdb952fce3e3a81a0236a487ef123d0d808b276aba92f94e1bcde19016568e4254af33458dc16c0a4c7b1e53a11c5f9688ebc5c32a0d09f789be3c48d55ee5798a73a46c3f2b0a653fbdad72afd05070405189ca9088a637df91319b1bcce7c6be8c84a89fc889e7c315710162f69f6269c09bafc8617008d05e4bcce393315375d04e38eedc31192ac1", 0xe7) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 19:08:20 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xfff, 0x400000) listen(r0, 0x5) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) readahead(r3, 0x4, 0x3) 19:08:20 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000140), 0x4) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0xd2, 0x7, 0x4, 0x40, 0xf7, {r1, r2/1000+10000}, {0x2, 0x2, 0x1, 0x80, 0x81, 0x61, "4273e672"}, 0x0, 0x3, @userptr, 0x7, 0x0, r3}) ioctl$FBIOPUTCMAP(r4, 0x4605, &(0x7f0000000300)={0x2, 0xa, &(0x7f0000000040)=[0x2, 0x7fff, 0x4, 0x800, 0x2, 0xffff, 0x8001, 0x1, 0x9, 0x200], &(0x7f0000000240)=[0x1ff, 0x2, 0x800, 0x9, 0x81, 0x5, 0x7], &(0x7f0000000280)=[0x0, 0x87a, 0xe1ee, 0xf667, 0xd0], &(0x7f00000002c0)=[0x80]}) [ 1645.876585] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1645.946173] hfs: unable to change codepage [ 1645.951980] hfs: unable to parse mount options [ 1646.191356] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1646.206143] Unknown ioctl 35123 19:08:21 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000040)=""/64) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206010000000000000000000000000010000300686173683a69702c6d61630005000400000000000900020073797a300000000005000500020000000500010006010000"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x4044980}, 0x48004) 19:08:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="26a9a8410beb2a3ca69d613b8899060900000000000000e31cddb72c03941f1865ee9120d3adeb23d6c27d74138e3baf4b69d1befcd443a1fb03e16b425f7a677683fc8730cb26b650d292372b40e29cac3af2be145f30bbb39a751808e500000000000000"]) 19:08:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x45, r5, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x22, 0x1, r4}, {0x2d}}]}, 0x58}}, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r8, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r8, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r8, &(0x7f0000001380), 0x40003ad, 0x2000000) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r9, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r10, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000240)={'syzkaller1\x00', r10}) recvmmsg(0xffffffffffffffff, &(0x7f0000001000)=[{{&(0x7f0000000280)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000300)=""/42, 0x2a}], 0x1, &(0x7f0000000380)=""/42, 0x2a}}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000003c0)=""/227, 0xe3}, {&(0x7f00000004c0)=""/122, 0x7a}], 0x2}, 0x1}, {{&(0x7f0000000580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/71, 0x47}, {&(0x7f0000000780)=""/126, 0x7e}], 0x3, &(0x7f0000000840)=""/139, 0x8b}, 0x7fffffff}, {{&(0x7f0000000900)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000980)=""/114, 0x72}, {&(0x7f0000000a00)=""/214, 0xd6}, {&(0x7f0000000b00)=""/206, 0xce}, {&(0x7f0000000c00)=""/105, 0x69}, {&(0x7f0000000c80)=""/242, 0xf2}, {&(0x7f0000000d80)}], 0x6}, 0x2}, {{&(0x7f0000000e40)=@ipx, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)=""/251, 0xfb}], 0x1}, 0x7fffffff}], 0x5, 0x2000, &(0x7f0000001140)={0x77359400}) r13 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r13, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r13, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000001180)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000001280)=0xe8) r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r15, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r16, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r17 = socket(0x11, 0x800000003, 0x0) bind(r17, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r17, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r18, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r19 = socket(0x11, 0x800000003, 0x0) bind(r19, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r19, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r20, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000012c0)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000013c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000001800)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001400)={0x384, r5, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r12}}}]}}, {{0x8, 0x1, r14}, {0xec, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x81}}}]}}, {{0x8, 0x1, r18}, {0x1b4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x200}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r21}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x5fed, 0x63, 0xdd, 0x8}, {0x3f, 0x3, 0x2, 0x9}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0xc, 0x4, [{0x4, 0x67, 0x9, 0x8037}]}}}]}}]}, 0x384}, 0x1, 0x0, 0x0, 0x20004001}, 0x8840) mq_open(&(0x7f0000000080)='.selinux\x00', 0x40, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 19:08:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f00000071c0)=[{{&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000240)=""/186, 0xba}, {&(0x7f0000000300)=""/175, 0xaf}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000180)=""/45, 0x2d}, {&(0x7f00000003c0)=""/56, 0x38}, {&(0x7f0000000400)=""/118, 0x76}, {&(0x7f0000000480)=""/219, 0xdb}, {&(0x7f00000010c0)=""/4096, 0x1000}], 0x8, &(0x7f0000000600)=""/82, 0x52}, 0x7fff}, {{&(0x7f0000000680)=@phonet, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000700)=""/43, 0x2b}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/99, 0x63}, {&(0x7f0000000880)=""/71, 0x47}, {&(0x7f0000000900)=""/196, 0xc4}, {&(0x7f0000000a00)=""/56, 0x38}, {&(0x7f0000000a40)=""/146, 0x92}, {&(0x7f0000000b00)=""/216, 0xd8}], 0x8, &(0x7f0000000c80)=""/27, 0x1b}, 0x4}, {{0x0, 0x0, &(0x7f0000003300)=[{&(0x7f0000000cc0)=""/238, 0xee}, {&(0x7f0000000dc0)=""/175, 0xaf}, {&(0x7f0000000e80)=""/84, 0x54}, {&(0x7f0000000f00)=""/204, 0xcc}, {&(0x7f00000020c0)=""/235, 0xeb}, {&(0x7f0000001000)=""/84, 0x54}, {&(0x7f00000021c0)=""/71, 0x47}, {&(0x7f0000007400)=""/4106, 0x100a}, {&(0x7f0000003240)=""/108, 0x6c}, {&(0x7f00000032c0)=""/53, 0x35}], 0xa, &(0x7f00000033c0)=""/4096, 0x1000}, 0x7}, {{&(0x7f00000043c0)=@ipx, 0x80, &(0x7f0000004700)=[{&(0x7f0000004440)=""/75, 0x4b}, {&(0x7f00000044c0)=""/116, 0x74}, {&(0x7f0000004540)=""/142, 0x8e}, {&(0x7f0000004600)=""/199, 0xc7}], 0x4}, 0x1}, {{0x0, 0x0, &(0x7f00000048c0)=[{&(0x7f0000004740)=""/159, 0x9f}, {&(0x7f0000004800)=""/36, 0x24}, {&(0x7f0000004840)=""/72, 0x48}], 0x3, &(0x7f0000004900)=""/214, 0xd6}, 0x1f}, {{&(0x7f0000004a00)=@ax25={{0x3, @bcast}, [@null, @null, @null, @null, @bcast, @remote, @remote, @bcast]}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004a80)=""/27, 0x1b}, {&(0x7f0000004ac0)=""/11, 0xb}, {&(0x7f0000004b00)=""/14, 0xe}, {&(0x7f0000004b40)=""/41, 0x29}], 0x4, &(0x7f0000004bc0)=""/1, 0x1}, 0x7ff}, {{0x0, 0x0, &(0x7f0000004cc0)=[{&(0x7f0000004c00)=""/187, 0xbb}], 0x1, &(0x7f0000004d00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000005d00)=@x25, 0x80, &(0x7f0000005f40)=[{&(0x7f0000005d80)=""/177, 0xb1}, {&(0x7f0000005e40)=""/251, 0xfb}], 0x2, &(0x7f0000005f80)=""/172, 0xac}, 0x8}, {{&(0x7f0000006040)=@tipc=@name, 0x80, &(0x7f0000002240)=[{&(0x7f00000060c0)=""/27, 0x1b}, {&(0x7f0000006100)=""/4096, 0x1000}], 0x2, &(0x7f0000007140)=""/72, 0x48}, 0x40}], 0x9, 0x10000, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:21 executing program 4: unshare(0x8000400) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000000)=0xffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) 19:08:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x44}}, 0x0) [ 1646.866404] hfs: unable to parse mount options 19:08:21 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="480000000206010000000000000000000000000010000300686173683a69702c6d61630005000400000000000900020300797a300000000005000500020000000500010006000000590dac098ed7e9a80b47be3f01950ffba4d8b3a3caed450923db7d7a923db017"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:21 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500013e79971b0b46605226692d22fc6afdc43e1c8409f05fcb25c1ffffa75486566ec4436ebfc2fd9620e6d5a25fb83d7ee58211b705b0069c32e37b77843f7ffc689b41ab4b672a48794787360a8db68139c06e0900c4aaab2852b4682e00"/128]) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000240)={0x1f, 0x2, 0x1}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206010000392697114ab44acaa218a3246763000000000000000000000010000300686173683a69702c6d61630005000400000000000900020073797a3045047eeb8500"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x144, r2, 0x1, 0x0, 0x25dfdbfe, {}, [@NL80211_ATTR_STA_WME={0x1c, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0xff}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x7}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x3}]}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xc9, 0xbe, "ecfa0b5e1fa0ecdc56380eba541cf572c8265d8caad766beeb457552da3b400e0de4681157d1e4dd9e06987347f8155f142fe68d16d3e08b0681d213de1b7bb62ef58aaba481c0d269cd148906a2420acdc0c0ddc18cfc2b9584a519355523bae873e58e5e9999a18c5a8ac68e81774eb48f6d4d895cdf1bbb89942249228deb7c46b0a93616d4e3634ba92e6da1a2993742a03b62176c0b1b380baf1c81b7433633c675775e6808a299dcf580ac553c0b284a4437b0657a2c1573f0d4dbb130082f4209bf"}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x5}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x6}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x25, 0xbe, "cd1ae1dde0d77119524197e2a76735dca8baaf72fe4baef868f25caf16b12491e8"}]}, 0x144}, 0x1, 0x0, 0x0, 0x1}, 0x0) 19:08:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x44}}, 0x0) [ 1646.890276] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1646.926907] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.1'. 19:08:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x6) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8a37, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000040)={0x0, 0x0, [0x6, 0x912, 0x80]}) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp857,codepage=cp7s7,\x00']) 19:08:21 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="44001a00020601000000000000000000000000000c000300bc6173683a697000050004000200000005000100060000003fb915fddbb92c77f1427d4d576a6cae8973fb6e1af77aada0800f"], 0x1}}, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000000c0)={0x7, 0x2, 0x7f, 0x9, '\x00', 0xf3}) [ 1647.016948] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.0'. 19:08:21 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000000)={0x1, 0x8}) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) stat(&(0x7f0000000880)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r4, 0xee01) setresgid(0x0, r4, 0x0) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x1020001, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0xb1fa}}, {@default_permissions='default_permissions'}], [{@measure='measure'}, {@subj_role={'subj_role', 0x3d, 'syz0\x00'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@dont_measure='dont_measure'}]}}) [ 1647.082824] hfs: unable to change codepage [ 1647.095722] hfs: unable to parse mount options 19:08:21 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x48}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x32040, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000040)) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1647.127199] Unknown ioctl 1077957909 19:08:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x1410, 0x20, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x4}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x5}]}, 0x40}}, 0x8000) 19:08:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000180)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x6801048}, 0x8, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40804}, 0x24040040) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @broadcast}, 0x10) unshare(0x8020400) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x628002, 0x0) r4 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r4, &(0x7f0000000000)) 19:08:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x80, 0x5, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x80000}, 0x4804) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000015c0)=""/4096, 0x1000}], 0x1, 0x1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r4 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r4, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x38, r3, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x900}, 0x800) getpeername$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000001c40)={0x1624, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_IE={0x5b1, 0x2a, "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"}, @NL80211_ATTR_BEACON_HEAD={0x845, 0xe, "f6d993b068a48e947607ff3640bce7837c3cff2ad016a21b5e878d310313f452c9f21e41a8c8ded7972295846b79a6210cf5d72206a9c2104b6761d36e0e600f2a5b836b4895f4448be918060d1bd9069ed5a4c4695ecd5052bf00c311672fd11dc46b2ac0e9b31daa9da4a3f0adf9b2a1ab20f7e57c1cd7858a2d0b10a14b39b2d568c4360d20c3b72aea6b2234308821f0440c5e19eda07648d0b3bd6e2615ff479822e13f7a50298285633d043e24a97610d57921676659acd8eb76f816827e1c4af3271b8335f88eeca31405f5077bf2cdf0f57ac09b6584cddfac26ab840b49c46e6bb211d7f52eddf1951a76be80ce3749b248e6f71654f906b04e5b4616e560d75cec04803ff54dc3c01b646afb9f755dfc7ccb0dd32ed6a57125d75df3ad8b57b3bc10dccf9eec6087a3bec11ca9a9bc5e9815cdbb7cd776d205456f6cf5d21709a7db49e7fd10788ee9d23bfc7bcbf98528cd628a2eca6bbbf98f07aa147aff8941c17a4aa42086623f5848cfe5dc5f6a29007753fdaac53114f61596d4e0e51f09b317fd0302e773e7cce1f60bd747719d1ca197a92c9d1217a9641c0143d6f2e9fc64bf6d1bc5aaa526875d6731d27b80b262be92c9e7975eba32901167b1155da1df901c69df8437a92e2f9fb73bc147b2167c96c3c89c9f7ba02fd5d2dd25fed4e7181d39ceb133db3fa5257a57225dfd9f128ff97d71a8e07eceb1b693a8029c303cb772ae0a36707be154d35c761ca2169305000c532fbd6ebfcf4a26f739e33bca5c53aa34d2f3cd4498f97fc9a65c01e87a236d0819870d9a7ea6eda6fd93111a3310341eee380e71166a5e082d9a0c2d095b68d54205c815902b349e14bd44698a650b28a37d0b43a93e4a162b5d1f01d8d6249a5792213aed2684284801979ae881163ed836020b6ef7e68fe119fe7f5fd771f5d4f7f63d79761fdd66e2a78bafaf3ab8eb1d4839c0c5ac35c0394f24bf312c2dd977444cc991f2bb2f9e5dff6236b99591115cddb0084d2d31342669be277980cf705b049863ed49e20b6a416702e6fccc279d9073e231f7129e4a30e8d0f73cd848da873e485b969cae272298f33682b0cd89f5de8630b50f69f6dd15a3e8a620b9ef972b48fa78fa519aa57fa81412493639618cbf3fa0b8d548c0973cffd1df57ff1708076532db7d5230c56bb8877ed808dcd1c759358df5aa65143ac1837a354ef4d2edc74b0daed9017bcc1b843aac01688aee28b069219072402fd730000170b9ce01f20626082dbeee395dc75819aecbe3aa841d3e15bc14715f541c8447a2f8dd85018d6b2a01fc90d7655ac80ff3720973fb48aac86dd6561b6b3347f2c75cb3c04eeef63a84f44546936c852146292829fc1cbca6f25aaa2767ce8ca7a831be962856e149322a6ca59b614db16766dbdfd58a6583a2136d0414fda630449ed34ad51af4775eb84bae7a9c6260a642b810c4dc49fe6cbaeb808a953de35d9a5d909b8d56eefa1346f528204f4ee88e4e6709422b11ce31694845b48ee9660e336ae53e749fed66f965ed32ac1efc25925f29c2307a90e12943dd6168fda7b993656f5cd2be3162d8c244f7f3f516a3c72f64e3ee2441df0287204a41a96cd0b2b1e56194a5ebedc6eb64a924ce4509b24eca986328f0a7e25c41774f65b32c72d15182b14f30f025a67e425593b9b8633c8e2e2877580a58f9ada8609025849d3d110f05ef32f73b62430eb15336719afdd67a4b163c5cca69e0ebfea65c3350ad51451d5440dbdcc0663f048eb31628a4260a70dfc99102dd9b705843efe1dcfbbd3b6d0d0f51c3a7bdff1bef6a0464807f9554439c1de977db5414a7ac6fd3abccf37ba6fecef0a5161ca699c00ea3aabdcdc17d58b83ac075f891ab5380f23cb0eb4e955235334f4512dc2b7adaf06561f7dcbfd0d636f0a1c57b86a53a6dedf6c670579c28d460c58d2ef1f28640c31a7fc5c89b4705c06965b0e28d42ebc2a75e3488c9c188179969817a0af98ff2519d37dc658329c5bc430024e54d101780a515b559b5139ae4bf4f574284f4cb06de775bb5442be629f878a4878ba52a889cdc0179d4d7747de75561f9af72c6ee7b31966173271292430f210c05728d04fd8278d42b9528303804ac723fddd5cb905bda68b23a30ddeb87a687909c2a32913571dc5a69673863804cb5f854d8446803dae3656c2edb04f2e34b1dc5b36e75d0d938e1637de360765ad1d598d0c7889a6d01a8f65773a2c34fcb7fa5cc009e17f4a7c55ed621c2a9f8122e60c7c7156ff0a8c039474dec4320ca4d25c580556f3a771b85b18d042621c85e4a31ca40c4dd1188a85ff602708c8c4f16dc50706ec0dbe23c2ee0b9b39971dca9f505d26f02b9320acdcc2853e8893d637430c63d24435fe816f86862fd4a77ad3adab020a69683f8f0fc4cbcf611d5e96427d89ca9bd8d0770dd1cee8e474ebb090d76c01ee17b5cf7bfbe90c131ac60572882201c83285e8bbcb711552bbe533d2567267220b787d79f809eb7d9e4112f577cdf8bca8e58b873327e415feacd2a585a098e7b3553161098f4a5d0533666e84a5736d21fc7b03c8c572854e61b9c2db98b0c36034a4468e207d28e2182ea15e5dcdb49dd695c9777307665f323ccd6707ee185aaa3fa467a0698d9ef2a1d0234227f426b68f64768dbad252fcda45bd4990b5861936105a1abd2919c0a172546e6c2ac012ebe7b9d9c319b30f9d3aa12edc77816a2b22671640619631859e15368c137ec8250dfa853cdc379a3c46c0d860dfb79508adc73ef0837b765a3004b08bdce6be3be7e2b3eaf7c519803e4eda137f1c34d70d58efe7cd13311626842fe89e06993f66141399abac19eb2f55f5f86a0aced1acfbddcf7a23bd6d4e33b1d7f2833526b96efd8e03cceaf170dcfd895d0f67482b1ebd605cd041455c6355c826253a9d0fe65faed54421a24e119e0b9aaf9325af44cae642dc7"}, @NL80211_ATTR_HIDDEN_SSID={0x8, 0x7e, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x1c, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x0, @multicast}]}, @NL80211_ATTR_PROBE_RESP={0x7de, 0x91, "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"}, @NL80211_ATTR_HIDDEN_SSID={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1624}, 0x1, 0x0, 0x0, 0x4c010}, 0x8040) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 1647.303018] hfs: unable to change codepage [ 1647.307915] hfs: unable to parse mount options 19:08:22 executing program 2: socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$UI_DEV_CREATE(r1, 0x5501) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4400000002060100000000000080000000000000a52304f41c84ac3743ab560c000300686173683a6970000500f2315bd8aa07fe1e020073797a30000000000500050002"], 0x44}}, 0x0) 19:08:22 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={r5, 0xfffff801}, &(0x7f0000000040)=0x8) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r8 = dup(r7) ioctl$SG_GET_ACCESS_COUNT(r8, 0x2289, &(0x7f0000000600)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r6, r8}}, 0x18) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 19:08:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc708, 0x7fc00000000}, 0x1000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x3, 0x7, 0x201, 0x0, 0x0, {0x5, 0x0, 0x8}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x51}, 0x8000) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000640), 0xc, &(0x7f0000000a00)={&(0x7f00000006c0)={0x318, r3, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffff18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd6a}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x51}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbbd3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x91b4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x120, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x47af}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2a6d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7, @empty, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x8, @local, 0x800}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x32}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5ef}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffff}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffff7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x40}]}, @TIPC_NLA_BEARER={0xa8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'macvtap0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x6}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @remote, 0x1}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xadd00}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}]}, 0x318}, 0x1, 0x0, 0x0, 0x4081}, 0x20000000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff0000000001000000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d318bd5f3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5a78675670db8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f01e3322a713c5e1ec1f004eb9687e9f9840c1d7119782bbf4bc0a8715b2df374885e086115820fab2294a57322b4b3bce1bc88a708435e2112b8b82a4826eef465767a379a1785085f807e8ac1b4644bce274e6a03fc5e352c8d18479c7f82db29968894daed14c3d6fa68eae46221007a16bd381009bf8d3bd44f744af187d2f695b3b822d43d396d06d2351f7d752f58614fb40c3a63e081de70dc7372ea2ef52dbdddf6bace467e9a8e7b3f4764117c5f47301dd0dee0fb039dd4ba82338656e7d6ab2009e3646ab8849ad3a7ce99524ec5265cacfb14b889dc92d3344f8563fcaa54960f6e8e807534ca46df8d5c6f9144db16e2d14c7af838cc8126e38200"/557], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000d40)=ANY=[@ANYBLOB="010000000000000000000000eb9745ce472620bcf72057e0b78d2030d3ad17ac3d7425363fb6f9d07e6e19b5cdab41fb48e82e2feffd6c6ac8385a86f5c5264b2853db8e7a0727186f21a14305a38248a39029e514aac2b850450ce040819497c812ffc4b937681660803568813522a5ef555aa89e"]) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000000ac0)=0x543) getsockopt$bt_hci(r5, 0x0, 0x1, &(0x7f0000000380)=""/206, &(0x7f0000000480)=0xce) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r7 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r7, 0x2289, &(0x7f0000000600)) r8 = dup(0xffffffffffffffff) r9 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r8, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x84, r9, 0x100, 0x70bd29, 0x25dfdbff, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_DOMAIN={0x16, 0x1, './cgroup.cpu/syz1\x00'}, @NLBL_MGMT_A_DOMAIN={0x16, 0x1, './cgroup.cpu/syz1\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @remote}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x40001) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r11 = dup(r10) ioctl$SG_GET_ACCESS_COUNT(r11, 0x2289, &(0x7f0000000600)) ioctl$HDIO_GETGEO(r11, 0x301, &(0x7f0000000a80)) sendmsg$NLBL_MGMT_C_REMOVE(r7, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r9, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008011}, 0x81) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$SIOCAX25GETINFO(r5, 0x89ed, &(0x7f00000004c0)) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$VIDIOC_DQBUF(r6, 0xc0585611, &(0x7f0000000440)={0x80000000, 0xa, 0x4, 0x1000, 0xffff, {0x77359400}, {0x2, 0xc, 0x2, 0x3, 0x0, 0x8, "1c50353c"}, 0x200, 0x2, @fd, 0x40, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_FMT(r7, 0xc0405602, &(0x7f0000000180)={0xc6be004, 0x3, 0x2, "9c75da58145ab4ff205ed4d0249eb4b78808c1c9eb3f5a44e755c2415f2f4394", 0x30395056}) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)=""/83, 0x53}, 0x1) sendmsg$NL80211_CMD_SET_MPATH(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x48, r3, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @local}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_MAC={0xa, 0x6, @local}]}, 0x48}}, 0x800) unshare(0x8020400) r9 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r9, &(0x7f0000000000)) 19:08:22 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0xb}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x20008054) unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) renameat(r1, &(0x7f0000000000)='./file0/bus\x00', r2, &(0x7f0000000040)='./file0/bus\x00') creat(&(0x7f00000001c0)='./file0/bus\x00', 0x28) [ 1647.779400] Unknown ioctl 21761 [ 1647.806465] Unknown ioctl 21761 19:08:22 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000400)={r0, 0x76, 0xa0}, 0x0, &(0x7f0000000440)="82db6e21a8715108d270541631965d1ffd7490f5820cc6ee74da1283c5c2f2082c44565402ffafb2e25f163a0b528b34ec459b8ecf3a415f7480bc870f5a9f07046e10e224d15a4520d51c06efa2acb1b1e185b080afca85b6b93724fc0eb863717dae49ef3a7245ee307ea5f66227c9ec42bc179be7", &(0x7f00000004c0)="756c6767535067634d6d360013340edea3cea9cbc3800dda3ec02a7c72f498f70e44c5596885b3bb4e1759c52500f81bd904032f151b3d5a030255d965d7f747213c08602587e04ede21e3b174e13d5bca12f88e728bbeca430a1cc535f4ad6de884b76f27b41de980134fcd97e783048ea14a5e9040d9c4c0361691ab07020f398928ed598ecf64f75126b2fbb39f4554508eb3eb04214eb74d0773f720a01b") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, r0, 0x1d3a, 0x8, r1) [ 1647.831888] hfs: unable to change codepage [ 1647.868225] Unknown ioctl 35309 [ 1647.887706] hfs: unable to parse mount options 19:08:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206960500000000000000000500000010000300686173683a69702c6d61630005000400009c33ec90cd571c65797a300000000005000500020000000500010006000000"], 0x48}}, 0x44046) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1647.927356] Unknown ioctl -1067952623 19:08:22 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000080)='statm\x00') ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000040)={0x4, 0x4}) socket$nl_netfilter(0x10, 0x3, 0xc) 19:08:22 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={r5, 0xfffff801}, &(0x7f0000000040)=0x8) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r8 = dup(r7) ioctl$SG_GET_ACCESS_COUNT(r8, 0x2289, &(0x7f0000000600)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r6, r8}}, 0x18) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="636f6465706167653d637038353d63703733372c00429fc5cf36e885cc9368bbea7b36ca5f2207b101d835b2621e715a09da7a09cda762ff3a3aaea620327cf2c008a3866ba70149a9a7d024d753d9707a33931cecc80d5a4e4881f54727f03fb459333a06911b7e5f8528cc53c2c9627fdd4aa7fa9396e466e4b329c8d4426e2c8e5d745c4704ac3bd42db8f7febe16eab263e9999cf18a0ad95693dc49cef2901e9da521f81612d1fa44570fc6d887a2115cf0541279b0b41be709b43488cd354d28209265b4b2ed1e30abc44cec49"]) 19:08:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x94, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x5c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @rand_addr="71a696bc10962bb87d1bdec225388a12"}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e24}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x2}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x9}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x1000}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x7}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x40}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x94}}, 0x0) 19:08:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 19:08:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="48000000ff7f1ae04f81a5e201000000000000000000000000001b0003e1686173683a69702c6d6163041f9ed700000000000900020073797a3000000000050005000200ccea087d8c00000500010006000000"], 0x48}}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r1, 0x800, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x24040840}, 0x11) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r8, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000480)={'vxcan1\x00', r8}) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f00000004c0)=0x0, &(0x7f0000000500)=0x4) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r11, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r12, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000005c0)={@broadcast, @local, 0x0}, &(0x7f0000000600)=0xc) r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r15, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r16, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000b40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000640)={0x4a8, r4, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r6}, {0x28c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x817}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r12}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x200, 0x0, 0x6, 0x4}, {0x43d7, 0x9, 0x7f, 0xff}, {0x0, 0x4, 0x7, 0x8}, {0x5, 0x3, 0x0, 0x1}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r13}, {0x1b0, 0x2, 0x0, 0x1, [{0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x9, 0x3, 0x4, 0x8}, {0x4, 0x7, 0x9, 0xffffff81}, {0x7, 0x8, 0x4, 0x81}, {0x2, 0x2, 0x9, 0xa5af}, {0xeb, 0x8, 0x1, 0x1000}, {0x1ff, 0xff, 0x6, 0x6}, {0x8, 0x1f, 0x3f, 0x7ff}, {0x400, 0x9, 0x5, 0x80}, {0x7ff, 0xd4, 0x8, 0x5}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x4000041}, 0x1815) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) timerfd_gettime(r2, &(0x7f0000000140)) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r4 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x2) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) mq_notify(r2, &(0x7f0000000000)) [ 1648.186723] hfs: unable to load codepage "cp85=cp737" [ 1648.211817] hfs: unable to parse mount options 19:08:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000020601000000000000000000000000f90c000300686173683a69700005000400000000000900020073797a300000000005000500020000000500010006000000d3fe264a5c4b0ae80747080270"], 0x44}}, 0x0) [ 1648.323240] Unknown ioctl 35123 [ 1648.328820] hfs: unable to change codepage [ 1648.367439] hfs: unable to parse mount options [ 1648.402600] Unknown ioctl 9221 19:08:22 executing program 2: sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x88, 0x0, 0x8, 0x0, 0x0, 0x0, {0x5, 0x0, 0x6}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88fb}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6558}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x3d28a5de}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x10}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x3}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}]}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2ed4}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x40040}, 0x894) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="44000000020601000000000000000011000000000c000300686173683a69700005000400000000000900020073797a300000000005000500020000000500010006000000"], 0x44}}, 0x0) [ 1648.481185] Unknown ioctl 9221 [ 1648.485954] Unknown ioctl 35123 19:08:23 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x45, r4, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x22, 0x1, r3}, {0x2d}}]}, 0x58}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r6, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r8, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r11, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r12, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r13, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r14, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r15, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r16, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)={'batadv0\x00', r16}) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @can, @llc={0x1a, 0x0, 0x7, 0x41, 0x7f, 0x7, @local}, @xdp={0x2c, 0x3, 0x0, 0xe}, 0x20, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000300)='veth0_to_bridge\x00', 0x456, 0x2, 0x2}) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) r20 = socket(0x11, 0x800000003, 0x0) bind(r20, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r20, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r21, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000740)={'wg2\x00', 0x0}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000007c0)=0x0, &(0x7f0000000800)=0x4) r24 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r24, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r24, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r24, &(0x7f0000001380), 0x40003ad, 0x2000000) r25 = socket(0x11, 0x800000003, 0x0) bind(r25, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r25, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r26, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r24, 0x8933, &(0x7f0000000840)={'vxcan1\x00', r26}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @dev, @initdev}, &(0x7f00000008c0)=0xc) r29 = socket(0x11, 0x800000003, 0x0) bind(r29, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r29, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r30, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r31 = socket(0x11, 0x800000003, 0x0) bind(r31, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r31, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r32, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r33 = socket(0x11, 0x800000003, 0x0) bind(r33, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r34 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x200000, 0x0) getsockname$packet(r34, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r35, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r36 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@ipx={0x4, 0xfb8, 0x100, "008f00005000", 0x9}, 0x80) getsockname$packet(r36, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r37, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000940)=0x14, 0xb63d1e60c23d5d27) r39 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r39, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r39, 0x29, 0x22, &(0x7f0000000980)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) r41 = socket(0x11, 0x800000003, 0x0) bind(r41, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r41, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r42, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b00)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001500)=0x14) r46 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r46, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r46, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) r48 = socket(0x11, 0x800000003, 0x0) bind(r48, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r48, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r49, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r50 = socket(0x11, 0x800000003, 0x0) bind(r50, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r50, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r51, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001f80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001f40)={&(0x7f00000028c0)=ANY=[@ANYBLOB="c8080000", @ANYRES16=r4, @ANYBLOB="000128bd7000fddbdf250000000008000100", @ANYRES32=r6, @ANYBLOB="b800028038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400050000003c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=r8, @ANYBLOB="e801028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000800000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040007000000080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000100010040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400feffffff08000600", @ANYRES32=r10, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r12, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000005000300030000000800040055020000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000300000008000600", @ANYRES32=r14, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r18, @ANYBLOB="3c0002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r19, @ANYBLOB="08000100", @ANYRES32=r21, @ANYBLOB="380102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r22, @ANYBLOB="080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r23, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r27, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400ff01000008000600eaa6b7b9c37232dbfb2885", @ANYRES32=r28, @ANYBLOB="08000100", @ANYRES32=r30, @ANYBLOB="7c00028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004006635000008000600", @ANYRES32=r32, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000500000008000100", @ANYRES32=r35, @ANYBLOB="f400028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000f32000008000600", @ANYRES32=r37, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000005000300050000000900040068617368000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r38, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r51, @ANYBLOB="08000100", @ANYRES32=r40, @ANYBLOB="ec0102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r42, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040003000000080007000000000040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400020000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r43, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000700000008000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r44, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040001000000080007000000000008000100", @ANYRES32=r45, @ANYBLOB="8000028038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400e5a75b1844000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b000000140004003900910405000000070003023f00000008000100", @ANYRES32=r47, @ANYBLOB="7c0002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r49, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e0000"], 0x8c8}, 0x1, 0x0, 0x0, 0x4010}, 0x40000) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) r2 = getpid() r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)=ANY=[@ANYBLOB="010400"/12]) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000080)={r8, 0x800}, &(0x7f00000000c0)=0x8) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = syz_open_procfs(r2, &(0x7f0000000000)='net/fib_triestat\x00') ioctl$KVM_SET_NR_MMU_PAGES(r9, 0xae44, 0x2) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={r11}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000100)={r11, @in6={{0xa, 0x4e20, 0x2, @ipv4={[], [], @rand_addr=0x8}, 0x1fa}}, 0x8, 0x2ff1, 0x3f, 0x4, 0x50, 0x8, 0x8}, 0x9c) 19:08:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x70, 0x2, 0x6, 0x5, 0x0, 0x0, {0x7}, [@IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROBES={0x5, 0x15, 0xff}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x200}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}]}, 0x70}}, 0x0) 19:08:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = socket(0x3, 0x800, 0x66) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r3, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in=@local, 0x4e24, 0x5, 0x4e21, 0xd823, 0x2, 0x20, 0x20, 0x32, r3, r4}, {0x81, 0x400, 0x0, 0x8001, 0x7ff, 0x8fd00000, 0xffffffff7fffffff, 0x1}, {0x81, 0x1, 0x81, 0x81}, 0x4, 0x6e6bb3, 0x2, 0x0, 0x2, 0x3}, {{@in6=@empty, 0x4d3, 0x6c}, 0x2, @in=@local, 0x0, 0x4, 0x0, 0x47, 0x9d, 0x2}}, 0xe8) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:23 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x8, "d48510644dae8a68d42f85c50cdabfd69bac6bcd87cb3718e8217e4c28eb05b6"}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x8020400) r3 = mq_open(&(0x7f0000000040)='.s\x01 \x00\x00ux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r3, &(0x7f0000000000)) 19:08:23 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080)={0x9}, 0x1) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x10144) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20022400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r3, 0x2, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0x4004000) 19:08:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="44000000020601000000000000000000000000000c0003006861736860bca8f8b9c7527f2de5183a69700005000400000000000900020073797a30000000000500050002"], 0x44}}, 0x0) [ 1648.765718] nla_parse: 2 callbacks suppressed [ 1648.765725] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1648.786108] hfs: unable to change codepage [ 1648.796547] hfs: unable to parse mount options [ 1648.800900] Unknown ioctl 35123 [ 1648.807279] Unknown ioctl 1077171746 19:08:23 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x20800, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffb000/0x3000)=nil, 0xb04, 0x2, 0x2, &(0x7f0000ffb000/0x1000)=nil, 0x7}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 19:08:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x21, @multicast1, 0x4e24, 0x2, 'rr\x00', 0x2, 0x100, 0x4}, 0x2c) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1648.885870] hfs: unable to change codepage [ 1648.895172] hfs: unable to parse mount options 19:08:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x8000000}, 0xc) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepagge=cp737,\x00'/31]) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x4e23, @local}, {0x0, @random="7bb5b8f2322c"}, 0x30, {0x2, 0x4e22, @loopback}, 'gretap0\x00'}) 19:08:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440000000206010003000000000000000c000300686173683a69b1e12855608d692fd257e800000000000900020073797a300000000005000500020000000000000000007aa2fd6afd3d774435b0779db7d222a570b0a226068e0ec49c795ddf952e2469ac17162a88089991041057b05ef36c8d0a1064e0847994b0793865e923d2ef5b97d0b8f78616a234b0d59de9050120feeb244f80b8231a75ac4840067b78a3685b1b"], 0x1}}, 0x0) 19:08:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x19, 0x0) mq_notify(r2, &(0x7f0000000000)) [ 1649.099837] hfs: unable to parse mount options 19:08:23 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = socket(0x3, 0x800, 0x66) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r3, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in=@local, 0x4e24, 0x5, 0x4e21, 0xd823, 0x2, 0x20, 0x20, 0x32, r3, r4}, {0x81, 0x400, 0x0, 0x8001, 0x7ff, 0x8fd00000, 0xffffffff7fffffff, 0x1}, {0x81, 0x1, 0x81, 0x81}, 0x4, 0x6e6bb3, 0x2, 0x0, 0x2, 0x3}, {{@in6=@empty, 0x4d3, 0x6c}, 0x2, @in=@local, 0x0, 0x4, 0x0, 0x47, 0x9d, 0x2}}, 0xe8) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800cd0705507210301fbf5194779500000206010000000000000000000000000010000300686173683a69702c6d616300050004e7ff0000000900020073797a3000000000050005"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r1 = dup(r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000600)) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_getattr(r2, &(0x7f0000000440)={0x38}, 0x38, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000001c0)={0x4, 0x2, 0x4, 0x70000, 0x6, {}, {0x1, 0xa, 0xff, 0x1f, 0x9, 0x8, "e1a66100"}, 0x80, 0x1, @userptr, 0x100, 0x0, r1}) sendmsg$AUDIT_USER_AVC(r3, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xfc, 0x453, 0x8, 0x70bd2d, 0x25dfdbfd, "87d73328dc2f4299c4d88704388bdfe0b2b50a4a16023e8d10b52d98317adb35d304ea4d12eb126857908664657ab4ca7166226b02a112e38235e6549a022c94da859d58740691548299ce987de9f6cd377bd8f08b061a12df2bc7cbc25f3eeb04efefcba69c8429651d28a87d717e7101c9107367b3a36446a5b54d423230a6a3f63fce83cc3dfc12e3a6d82a1ebd45f5b59ca7a70cbd3ae2bbe6ea3ed666bf842bb00ecddaf25db032935b92ab4ab073846194dd92abd5a4d9f13f232b264d755f74fb8d6e28cab620af874c6a6631c9aeccbb8953fb876977b3782cbd2d1a047c1f17128920260988", ["", ""]}, 0xfc}, 0x1, 0x0, 0x0, 0x8040}, 0x40004) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000020601000000000000000000000000000c000300686173683a6970000500040000009747bd76fe00000900020073797a3000000000050005000200000005000100fcffffff"], 0x44}}, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f00000005c0)=ANY=[@ANYBLOB="01000000000000000000ff00"]) sendmsg$IPVS_CMD_GET_INFO(r5, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040028bd7000ffdbdf0008000400ff000000080005000000000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 19:08:23 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) recvfrom$phonet(r1, &(0x7f0000000100)=""/133, 0x85, 0x12001, &(0x7f0000000200)={0x23, 0x2, 0x8, 0x95}, 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB="636f6465706167653d63703835370500000000000000653d63703733372c00"]) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000020}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x400, 0x70bd29, 0x25dfdbfb, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x12}, 0x4000811) 19:08:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x10100, 0x0) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) unshare(0x8020400) r3 = mq_open(&(0x7f0000000040)='\x00\x00\x13\x00\x00 \x00\x00\x00', 0x80, 0xf0, 0x0) mq_notify(r3, &(0x7f0000000000)) [ 1649.510538] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1649.542244] hfs: unable to load codepage "cp857" [ 1649.547161] hfs: unable to parse mount options [ 1649.580776] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 19:08:24 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000000)='./file0/bus\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) 19:08:24 executing program 5: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) read(r0, &(0x7f0000000240)=""/186, 0xba) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x4, 0xab) 19:08:24 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="48000000ff7f1ae04f81a5e201000000000000000000000000001b0003e1686173683a69702c6d6163041f9ed700000000000900020073797a3000000000050005000200ccea087d8c00000500010006000000"], 0x48}}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r1, 0x800, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x24040840}, 0x11) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r8, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000480)={'vxcan1\x00', r8}) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f00000004c0)=0x0, &(0x7f0000000500)=0x4) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r11, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r12, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000005c0)={@broadcast, @local, 0x0}, &(0x7f0000000600)=0xc) r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r15, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r16, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000b40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000640)={0x4a8, r4, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r6}, {0x28c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x817}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r12}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x200, 0x0, 0x6, 0x4}, {0x43d7, 0x9, 0x7f, 0xff}, {0x0, 0x4, 0x7, 0x8}, {0x5, 0x3, 0x0, 0x1}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r13}, {0x1b0, 0x2, 0x0, 0x1, [{0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x9, 0x3, 0x4, 0x8}, {0x4, 0x7, 0x9, 0xffffff81}, {0x7, 0x8, 0x4, 0x81}, {0x2, 0x2, 0x9, 0xa5af}, {0xeb, 0x8, 0x1, 0x1000}, {0x1ff, 0xff, 0x6, 0x6}, {0x8, 0x1f, 0x3f, 0x7ff}, {0x400, 0x9, 0x5, 0x80}, {0x7ff, 0xd4, 0x8, 0x5}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x4000041}, 0x1815) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) timerfd_gettime(r2, &(0x7f0000000140)) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) unshare(0x8020400) r1 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r1, &(0x7f0000000000)) 19:08:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="44000500020601000000000000000000000000000c000300686173683a69700005000400000000000900020073797a30000b000005000510020000000500010006000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x6, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x1}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x10042804}, 0x40000) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) sendmsg$SOCK_DESTROY(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000010c0)={0x127c, 0x15, 0x400, 0x70bd2c, 0x25dfdbff, {0x28}, [@INET_DIAG_REQ_BYTECODE={0x18, 0x1, "601d2124a314a5dce8015b7572255a665933273b"}, @INET_DIAG_REQ_BYTECODE={0x8f, 0x1, "15a1140e82ebfcce47106a5c2d90962810d82b7512245439db5a148f56c80a95090dc20f3fa4d268af2870acbfc8f3f3716386f33bab235c8baa9a739865864ea884e21b90d7289485f90a3b7f880023d81094807b470126db717cbf7fd5747a6a0269c56015682278fcf665d6b3b19575ecee7345ccd939d45aa81fd606c7495bd426998197b13565be0c"}, @INET_DIAG_REQ_BYTECODE={0x3d, 0x1, "09c690d9cb1af2ed2d126108a18f5d7cb6dda81491c350690488615807d76a7bb8bd1b6573c913a9d59cbc7065eb54576a5a54a5015dd652bd"}, @INET_DIAG_REQ_BYTECODE={0x81, 0x1, "30a1dc320b19c880d7e763172676e1c460e1a7f6b10da72d2d7d5bae80b9033189daf3fbc5168dd0c9ba55305a35a7f5de85279d5c535dd542ab009623b0eacc9568ac6411156bebac1af3430920fc5689ce1b6c55df604a17a010bbd2dc6ce949cfe9b7da573daab2bb6f345df9494fe1c542eb9cde0f9537f773c584"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xf8, 0x1, "b00440831319e4d6a45daee59a0ccbe9dcdbf15422050a9e79a38c8aef87521769287d31ab53aa4b3b698346e37b4c4586aa1141740fa0e4b60932879fd860804318d3ed0c843ab2360433ad1616191201cf8af9de67c3ab1751f7323074c0c2d490892a5f1f907da401552b384dbb9b235c006e025b62023535c70df1679a3909dd8bcaa98127d5814c4fbe20f15140d2ddc11f747b29b6dda231bc24198b434464fcb4870a345ed0f7b8b4d70677283f3387862b40f21c081417cf796f54813e814aaf3eac5758f0b80a78a2bdbe9f56a4997e6de1c393557729dffe9329b67ed2323a0e11df8df332d3d2120dbf391713e246"}]}, 0x127c}, 0x1, 0x0, 0x0, 0x2000c000}, 0x404) 19:08:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r3, 0x0) r4 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x15, 0x0, 0x10, &(0x7f0000000380)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@uid={'uid', 0x3d, r3}}], [{@dont_hash='dont_hash'}, {@smackfsdef={'smackfsdef', 0x3d, '\\selinux'}}, {@uid_lt={'uid<', r5}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@context={'context', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, 'codepage'}}, {@fowner_lt={'fowner<', r6}}]}) [ 1649.795505] hfs: unable to parse mount options [ 1649.820846] Unknown ioctl 35123 19:08:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r1, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000004a00)='/dev/ptmx\x00', 0x200000, 0x0) fadvise64(r2, 0x1, 0x1, 0x5) sendmmsg(r1, &(0x7f0000001380), 0x40003ad, 0x2000000) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000000b00)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000004c80)={0x30c, r4, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xad4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x211}]}, @TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x358d}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x27}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x80000000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER={0x30, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1454}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}]}, @TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f91}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0x4c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x57}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}]}, @TIPC_NLA_LINK={0xf4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd35}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x30f0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9a5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x50, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfb}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}]}, @TIPC_NLA_SOCK={0x64, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xa8fc}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x62bc}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xd52}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x53}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}]}]}, 0x30c}, 0x1, 0x0, 0x0, 0x20000010}, 0x4090) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r6 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x5, 0x2082) getsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f0000000300), &(0x7f00000003c0)=0x8) r7 = dup(r5) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r8, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r9, 0xc02064b2, &(0x7f0000000400)={0x5, 0x2, 0x5, 0xff, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r7, 0xc00464b4, &(0x7f0000000440)={r10}) r11 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000004980)='/dev/cachefiles\x00', 0x94001, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r11, 0x84, 0x12, &(0x7f00000049c0)=0x2, 0x4) sendmsg$NL80211_CMD_SET_KEY(r7, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40001}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "2b0342a18eb82a386c7ee58329"}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x810) connect$llc(r8, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) r12 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/schedstat\x00', 0x0, 0x0) sendmmsg$alg(r12, &(0x7f0000004880)=[{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000640)="f044147491d8f965d3f95c0265a8e3cdc11242370733d45e70602baef1b07b4d111343fe1ff0eef942b9f0e449543c9119cff699a2c8bd08ae962ab0f71adbb8bffbd717a7c4fdf48932c399b5d0065452132c76178de90e4aabafcfc3749149913ec4438879141d407ebf980a12320116976b289799727d609c791ce6f92c7581bd62fe29f45a7a49e8b99e167a15ceda6090e40de99b316d70613d19320dbf9223d94b12a286c87f746ab511a1206fdf77e8dae5509c0c9a9cd90f32bb72455dfd0c971d082e806c3c974c5b0488d6491d3fca951cd3488ba78f200a5fd9f0f2e5672bc84f9edce2962a4bdbea7954", 0xf0}, {&(0x7f0000000740)="3e107f9fe41c940778b2f6f65be4e331b86f5bf76ec22a46b8ffc204b29a43ac97d4b9cf4c1cc85e7d830658515bf4ac4f906b19f3ba8023cb158b537f950933afb61986026b6a8994fcbf1811de0aaef04cbf865c275ea5770e482603eed1878d7eda7fa57d76ae774299d3f822f852f52abd", 0x73}, {&(0x7f0000000b40)="7fb8da08d1d4ed93ff64bc378bbc091cfe83c8c08d9fc635e57fa9a42565a00fe7346f70c1b78e62df7f2580e4f930d942367a2b70e5ea22423b43919b770ed7349596af2a4820197bf936846edb5354fdcb13a7d90196926f3e4b88ba54f209dfb0d194ffa8b26fb1", 0x69}, {&(0x7f0000000bc0)="518428bc681baa975a15b104cbdf693806c9f2836d5b1d57e8ce419fd8658218fb6ed56532cfaecc3ce93fe8ee73df09b1ed64d62843baf2bba72cbf05e12605842e0584b89062aa5d6d7f89778a46e832b18d7e52b1ef0a86da096c4cc660700b520e3e7b191489aea821d1be3d18ac7e0d0ae2c59749d86ffad811f52da000b4ce56085dac8e1893381747024518667740539ed97813202567940a642f5928fe1b6e96952da98a841ee500d7fd83ac2584ffc30ce2cd1cfd1fb8962c7e2171622d14373a982c894b7a778a39f726e97dd882629ddbec4b32c438fe4eb853d17aaac1b98604580b4074d95fdebe82af998c1bd11495d625dadb", 0xfa}], 0x4, &(0x7f0000000d00)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18}], 0x78, 0x4000000}, {0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000010c0)="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", 0x1000}, {&(0x7f0000000d80)="1c0aed94d87226a18c2bfcd49a946bb7d7ad64641718c5e7723054e41ce182b835c2c7e1c5aed2827ac1b03a4f381f5b5db207553a7f9b71295aed8819c34016bd492eb038304a1a1fe2648f6af311cca58cfc53f17df723d185b2b405a7f13f8aa32da417da347d8026047a476ee219dd5183eeb57cb0bf98a5e03ac1944a997db1a2ed7d26eeac4889f4d8d7cb45a6b7ef06401ebff759ee3464b6fa0eae8bcc60a0ae4733e4f1fbe468de81d2ee289c386da12519ee07e523a554847e57bbbe9df781dd8f7933c4fa0c199ccdbc", 0xcf}, {&(0x7f0000000e80)="a6e526933303cf2df2c03448c21522eafac4d4eea9025055b17e180526d46bb9f55b986b639108d2be64db07eb1e873a068e853979fe96a5b28965d968149b73d42c36ad4d81357626c1dcde009dcfa3a244066d115daf66d519dc14f4f2cde786baaf72f2bf44df0fd645525b8a51b6f2a7b9ab783b865d93c011a2a17f39cb00642548a0747eacfd1bc798fcc299b4dd1dc685e6e4d464ce47eb2a610e5b3babc0b3b7056d", 0xa6}], 0x3, &(0x7f00000020c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x5}, @iv={0x28, 0x117, 0x2, 0x12, "fd6b698e7b427ccdc876dc6b393ee0871c06"}, @iv={0xb0, 0x117, 0x2, 0x98, "9ce904378d477f0cb9eebec1055eba19ad520200ead077b2c728b986ada17726284354331a04124afc492a41a5bf6ff6eb524f38298f880bc040c9fa29522458da22bdad085c528cd940584484bfbb6c87a7703cdf836051e05a0a55a721b6b51b0225ee62cb70bec42150c5ca04c938ecbc2908135c73ff9fe2f2d3b1f928b7d3dc76c3d9c5235ef46fbddb9d1c0f4b723fcf8b2411d937"}], 0x108, 0x4010}, {0x0, 0x0, &(0x7f0000004340)=[{&(0x7f0000000f80)="912bf9b6de3dcbfc12a0de1468cfad93dbff31da60ab9672a7fd72be89265fd9d64be92da07b8097b0334fd36ffe19f5358c6d58142949ea296de397d1221c706f85397f2ed60c9605ba27c81e3c8b5b464149836cebf48352bb583a16f726149c8358006a80954d89a9698e9134e039fc04dcbf4474ba64620becdda62e8fe7", 0x80}, {&(0x7f0000001000)="a9e08a28e9e6094120a5b708ba8efbbbe2d022df81034185d001da160caffa6c8953ee0129ef9d81daadb4497a1184322f8ca93abaca1b1274d0dc8ecb9336d156eebe86a2", 0x45}, {&(0x7f0000002200)="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", 0x1000}, {&(0x7f0000003200)="9339137bb7b64e063b5bfb", 0xb}, {&(0x7f0000003240)="0353959ff90267c02f545c0bcf49b7286ea4f20e9e3c5d003ab2aa963cf65749e93dcc520f5a732a148cd84bb841e29204add06a0a824079de9d798ee57761024a1312460410a5c2b0cc8d20e724a2d713b7d3345651180b31c03415760723d6ca37a4542afc71c9c8ed96a70c", 0x6d}, {&(0x7f00000032c0)="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", 0x1000}, {&(0x7f00000042c0)="19ef04c101d59cb1cc63ffadc8fb547b47f6632a8f53ee822cf68393b90e19d4338e3fb1cbea0893a258f5a8fae7486a340237ea22810eb1d279bdd19807cd70835a81b83b8857c60da5f851ca28344e8ab55f06a7d0fe05d23c067af8eea4e4022703e533e60e863893d5b5226a414f1e61e6c3fe52bd3e", 0x78}], 0x7, &(0x7f00000043c0)=[@assoc={0x18, 0x117, 0x4, 0x9}, @iv={0x90, 0x117, 0x2, 0x79, "572844925397bea47f531de0b92e3259a81ba0f42d54c793317a1186e13511caaa0b30eba5cca9f55cc3d6d6caa1566ad684f8dfdde614555b303d845e0028b605b26fb3e9569ac2da999b254e2e440bf644ed13b0156fc95d84ede4250570a627d5ef0b154f0ed450542dadc2b42cce3ae809425bc05fcd2d"}], 0xa8, 0x4000800}, {0x0, 0x0, &(0x7f0000004780)=[{&(0x7f0000004480)="3f1cd5f5234fb44c389f8f3bf55b81e18b8aeb0a30d98b559f0e80373910de729bcd198ba59738f178e384923b6be998910fa6a589620a660fa81918130670408c816449907ce7efe9648d0fb8fb462378bde13e3b3ac0ab88fa23b9f575fd016474aa88beb294691d06c61b2bdb9d88f91c80119080b90afdeef57e4b0ab6c297d77208614191807e3c136cc5f4e6fc92b564b733f117155dd05a66598cae46e407f113ca7f82b2ac8b71a6b248c08c", 0xb0}, {&(0x7f0000004540)="528cd98de4814d075c599bfbac57dba25f29cc6d3c2c587c922c2dca34eea5cd1b14081912c8deb89ef1a82ee6ac7750f6a1f778713346260ad219f7373c389df3370604f76b234dfa6011c69b7f0410791fd78cba37f3b0cfad3797b18dc55dfd1f7696f4b7bc8d66b055a3bb9a534fee04a9ec300b37263416cbf28a758e0eddfc0dc1552a0525ea9daf861217ccb5853fb65c40310651e3877b821d49597197c1aa6becb0eb392ac0845e45d141b935ba833024d6174d113c226c80951d83c45df141d31be9f1ceaece339231f304c9", 0xd1}, {&(0x7f0000004640)="f0f51f6f042f1d83749330de4079e49c1239b9c46b32d39ade4d5ddd9905bea6761b04a0596c2cc9b5c0dcf695f8cda78598df727f2cebdb9641758913a2ab3b73a87f9fc49bd4f4b1e99e5439a21494e793549c0ee6c3ec6eb442c2add5433a73bbe47eadcc466fc2172789d7d8d608431b3f7612b09fc2ed94000e73bdd85c6ecd", 0x82}, {&(0x7f0000004700)="d746251bf6af4295d720ff42c0ea6263b904d2598c2761824c4dbba2ebfcaaa116c5c46d191e403413091a93", 0x2c}, {&(0x7f0000004740)="314965dac7dacabbbc9fb0398f8f120f68455e0f5440e73e53023e57d3a3b1dd86ca3f2bc23a", 0x26}], 0x5, &(0x7f0000004800)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x22}, @op={0x18}, @op={0x18}, @op={0x18}], 0x78, 0x44000}], 0x4, 0x4001) sendmmsg(r8, &(0x7f0000001380), 0x40003ad, 0x2000000) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYRES32=r8], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x0) 19:08:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x488, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x1) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/67}, 0x4b, 0x2, 0x2000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f00000002c0)=""/4096) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000012c0)=ANY=[@ANYBLOB="4c00000002060100000000000000000002000000120003006269746d61703a69702c6d616300000005000100070000000900020073797a300000000005000500020000000500010006000000e16fcbf9fff28d9f087daa785c15f600000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0xff, 0x2, 0x91, 0x0, 0x0, 0x45f7d459af0decde, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x57, 0xece}, 0x4000, 0x1, 0x81, 0x2, 0x9, 0xfffff800, 0x4000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) [ 1649.938858] hfs: unable to parse mount options 19:08:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140), 0x10) semget$private(0x0, 0x2, 0x110) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x3c, 0x2, 0x9, 0x101, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x200}}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x6}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x5}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x45}, 0x20044800) 19:08:24 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="48000000ff7f1ae04f81a5e201000000000000000000000000001b0003e1686173683a69702c6d6163041f9ed700000000000900020073797a3000000000050005000200ccea087d8c00000500010006000000"], 0x48}}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r1, 0x800, 0x70bd26, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x24040840}, 0x11) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r8, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000480)={'vxcan1\x00', r8}) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f00000004c0)=0x0, &(0x7f0000000500)=0x4) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r11, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r12, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000005c0)={@broadcast, @local, 0x0}, &(0x7f0000000600)=0xc) r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r15, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r16, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000b40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000640)={0x4a8, r4, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r6}, {0x28c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x817}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r12}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x200, 0x0, 0x6, 0x4}, {0x43d7, 0x9, 0x7f, 0xff}, {0x0, 0x4, 0x7, 0x8}, {0x5, 0x3, 0x0, 0x1}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r13}, {0x1b0, 0x2, 0x0, 0x1, [{0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x9, 0x3, 0x4, 0x8}, {0x4, 0x7, 0x9, 0xffffff81}, {0x7, 0x8, 0x4, 0x81}, {0x2, 0x2, 0x9, 0xa5af}, {0xeb, 0x8, 0x1, 0x1000}, {0x1ff, 0xff, 0x6, 0x6}, {0x8, 0x1f, 0x3f, 0x7ff}, {0x400, 0x9, 0x5, 0x80}, {0x7ff, 0xd4, 0x8, 0x5}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}]}, 0x4a8}, 0x1, 0x0, 0x0, 0x4000041}, 0x1815) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) timerfd_gettime(r2, &(0x7f0000000140)) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:24 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$FBIOGET_CON2FBMAP(r0, 0x460f, &(0x7f0000000000)={0x35, 0x2}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1650.113705] Unknown ioctl 35123 19:08:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x78) ioctl$SNDRV_PCM_IOCTL_RESET(0xffffffffffffffff, 0x4141, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x1ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000140)="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"/297, 0x3accf8d5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace(0x4206, r2) tkill(r2, 0x800000009) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r6 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r6, 0x2289, &(0x7f0000000600)) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$SOUND_MIXER_WRITE_VOLUME(r7, 0xc0044d10, &(0x7f0000000040)=0x5f) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000000)=0xfffffffffffffff8) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)={0xa0, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x64, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x4}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x9}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x8}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x1}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x63216ccc}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x6}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x400}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast1}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0xa0}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1650.135127] hfs: unable to change codepage [ 1650.139444] hfs: unable to parse mount options [ 1650.208036] hfs: unable to change codepage [ 1650.212776] hfs: unable to parse mount options 19:08:25 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0xb0, 0x1403, 0x8, 0x70bd25, 0x25dfdbfb, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth1_to_bond\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'vlan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'macvlan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'macvlan1\x00'}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x2404c990}, 0x4004000) 19:08:25 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x0, 0x0, 0x10000, 0x4}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x401, r1, 0x10001, 0xfffffffffffeffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 19:08:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000140), 0x4) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0xd2, 0x7, 0x4, 0x40, 0xf7, {r1, r2/1000+10000}, {0x2, 0x2, 0x1, 0x80, 0x81, 0x61, "4273e672"}, 0x0, 0x3, @userptr, 0x7, 0x0, r3}) ioctl$FBIOPUTCMAP(r4, 0x4605, &(0x7f0000000300)={0x2, 0xa, &(0x7f0000000040)=[0x2, 0x7fff, 0x4, 0x800, 0x2, 0xffff, 0x8001, 0x1, 0x9, 0x200], &(0x7f0000000240)=[0x1ff, 0x2, 0x800, 0x9, 0x81, 0x5, 0x7], &(0x7f0000000280)=[0x0, 0x87a, 0xe1ee, 0xf667, 0xd0], &(0x7f00000002c0)=[0x80]}) 19:08:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'maccyrillic'}}]}) 19:08:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000000206010300000000000000000000000005000100070000000500040000000000090000050005000200000005000100060000000000000000000000004873f6555a3fab076efdd26a04002aa7956ccf173551cdb7643e1f8f4bec16d75c00"/111], 0x40}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r3, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@deltfilter={0x2c, 0x2d, 0x8, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0xe, 0x6}, {0xb, 0x10}, {0x9, 0xffff}}, [@TCA_CHAIN={0x8, 0xb, 0x3ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x200080c5) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x800) ioctl$SIOCPNADDRESOURCE(r4, 0x89e0, &(0x7f0000000040)=0x8) r5 = ioctl$TIOCGPTPEER(r4, 0x5441, 0x800) ioctl$VT_WAITACTIVE(r5, 0x5607) [ 1650.779483] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1650.796304] hfs: unable to change codepage [ 1650.800904] hfs: unable to parse mount options 19:08:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$SOUND_MIXER_READ_STEREODEVS(r1, 0x80044dfb, &(0x7f0000000000)) 19:08:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @broadcast}, 0x10) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1650.832224] Unknown ioctl -1071619020 [ 1650.851202] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1650.889488] Unknown ioctl -1071619020 19:08:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000140)={0xa10000, 0x2, 0x400, r0, 0x0, &(0x7f0000000040)={0x9a0913, 0xdc, [], @p_u16=&(0x7f0000000000)=0x1000}}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000008}, 0x0, 0x0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) [ 1650.949929] hfs: unable to change codepage [ 1650.971106] hfs: unable to parse mount options 19:08:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x54, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}}, 0x0) 19:08:25 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/dlm-control\x00', 0x270e42, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0x7, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x4, 0x74bd2c, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c844}, 0x4000804) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x24, r2, 0x20, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x80000000}}, ["", ""]}, 0x24}}, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x37}}, r5}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000440)={0x9, 0x108, 0xfa00, {r5, 0xfc, "66cf1d", "623a76b120093a358f820695e9c801e625e26b4eb5edac99fa48c20920fc24cf9cf6e13263b9af35845cb94196cb13ee71d612972a6b082dd10e08a7288db661e4a237ba43034d2be28fd179bad2f0f1a13d25c0ca7445d7ac6b208231b93befd12ade411c8cf1fe7dd48e500e11bab76dc9a0261a7b7537400abc07bd81fd29c5e3f2657170985f341da15a557505758c1b4bb4c20701f51751aa6fb0bc59a84b8fd0aa5ff0e061988ddfce48af6cdbfd57b98734a4f2f9c7393058067d27731731eb017fcecee813f56684baea75f96fd66d8741ca44f189a20efe1d95dfb85df06bf3c19419971e11927ca9208af7c189dc6b22b13103cd4a03a415cb59f2"}}, 0x110) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000002060100000007000000000000000000100003993f49e9683a69702c6d616300050004000000000009d81d0073797a30000000000500050002ff00000500010006000000"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1651.066414] hfs: unable to change codepage [ 1651.080941] hfs: unable to parse mount options 19:08:25 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f00000015c0)=""/4096, 0x1000}], 0x1, 0x1) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r5, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r5, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r5, &(0x7f0000001380), 0x40003ad, 0x2000000) fsetxattr(r5, &(0x7f0000000480)=@random={'btrfs.', 'eth1\x00'}, &(0x7f00000004c0)='hash:ip,mac\x00', 0xc, 0x2) r6 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r6, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x38, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x900}, 0x800) getpeername$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) setsockopt$IP_VS_SO_SET_EDIT(r9, 0x0, 0x483, &(0x7f0000000440)={0x3b, @local, 0x4e24, 0x1, 'fo\x00', 0x0, 0x3d6a, 0x4f}, 0x2c) sendmsg$NL80211_CMD_SET_MPATH(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, r4, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x7}, 0x4000) 19:08:25 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, r0, 0xfffffffffffffffc, 0xfffffffffffffffe) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x1891c0, 0x0) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000000) inotify_rm_watch(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1651.118483] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1651.190814] hfs: unable to change codepage [ 1651.201962] hfs: unable to parse mount options [ 1651.253030] hfs: unable to change codepage [ 1651.257414] hfs: unable to parse mount options 19:08:26 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000100)=[{&(0x7f0000000200)="b2b9e5b26c98263c33b472facc5917e9adcfdd4bef86c2bb86d287d0010bbc3c7cb56b0e18db3aa221815f8de3cf80288128d92bc79a64ef1cba2537677175701e65b1fdcbb7cabff023b5315540bc37d17fc75c30d427f319ece809e0adf52d62e819d00005f49ccc0bf161130ff535fc554dc5e36bf67cdb730101f90c89f5f8a7195a97e428400db2b5a79dbfae1ed511f84943bad1fdfa56a6da8b0b7fde382437e96a3b62672da212a2f9035c9165e5566bb58c18bc9bd5edf47f37b53ebb9c13665af5035822561e74cda6312a77d56f7c44f0d502c3d746e2dd325a79f1797b13", 0xe4, 0x7f}, {&(0x7f0000000080)="9525cfbb8d5236189bcbcd1de0ff1bad25113d41ab5dc0a8248167634ac6cb1d0d0b5ad91385593b81bddf02b67ded1272ff69f5175ffe0da942f3", 0x3b, 0x5}], 0x802c, &(0x7f0000000300)='\x8e*/posix_acl_access\x00') creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) 19:08:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2000c004}, 0x4000001) 19:08:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x4, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000880}, 0x4000) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000400)={r1, 0x76, 0xa0}, 0x0, &(0x7f0000000440)="82db6e21a8715108d270541631965d1ffd7490f5820cc6ee74da1283c5c2f2082c44565402ffafb2e25f163a0b528b34ec459b8ecf3a415f7480bc870f5a9f07046e10e224d15a4520d51c06efa2acb1b1e185b080afca85b6b93724fc0eb863717dae49ef3a7245ee307ea5f66227c9ec42bc179be7", &(0x7f00000004c0)="756c6767535067634d6d360013340edea3cea9cbc3800dda3ec02a7c72f498f70e44c5596885b3bb4e1759c52500f81bd904032f151b3d5a030255d965d7f747213c08602587e04ede21e3b174e13d5bca12f88e728bbeca430a1cc535f4ad6de884b76f27b41de980134fcd97e783048ea14a5e9040d9c4c0361691ab07020f398928ed598ecf64f75126b2fbb39f4554508eb3eb04214eb74d0773f720a01b") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x448000, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000340)={0x8}) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000400)={r4, 0x76, 0xa0}, 0x0, &(0x7f0000000440)="82db6e21a8715108d270541631965d1ffd7490f5820cc6ee74da1283c5c2f2082c44565402ffafb2e25f163a0b528b34ec459b8ecf3a415f7480bc870f5a9f07046e10e224d15a4520d51c06efa2acb1b1e185b080afca85b6b93724fc0eb863717dae49ef3a7245ee307ea5f66227c9ec42bc179be7", &(0x7f00000004c0)="756c6767535067634d6d360013340edea3cea9cbc3800dda3ec02a7c72f498f70e44c5596885b3bb4e1759c52500f81bd904032f151b3d5a030255d965d7f747213c08602587e04ede21e3b174e13d5bca12f88e728bbeca430a1cc535f4ad6de884b76f27b41de980134fcd97e783048ea14a5e9040d9c4c0361691ab07020f398928ed598ecf64f75126b2fbb39f4554508eb3eb04214eb74d0773f720a01b") r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) keyctl$instantiate(0xc, r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/300], 0x38, r5) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@remote, @rand_addr, 0x0}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6gretap0\x00', r6}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x4000) r7 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r7, 0x1, 0x1, &(0x7f0000000140), 0x4) fsetxattr$trusted_overlay_opaque(r7, &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) pipe(&(0x7f0000000040)) 19:08:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r3, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)=0x0) r5 = geteuid() syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@part={'part', 0x3d, 0x1}}, {@uid={'uid', 0x3d, r5}}, {@umask={'umask', 0x3d, 0x24}}, {@quiet='quiet'}, {@quiet='quiet'}], [{@uid_eq={'uid', 0x3d, r3}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@dont_appraise='dont_appraise'}, {@fowner_gt={'fowner>', r4}}]}) 19:08:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000400)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x2c, r7, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000800}, 0xc004) sendmsg$NLBL_UNLABEL_C_STATICLIST(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x30, r7, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x4000090) ioctl$TIOCSETD(r4, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0xbc, r8, 0xd, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf325}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) write$FUSE_IOCTL(r3, &(0x7f0000000080)={0x20, 0x0, 0x4, {0x2, 0x4, 0x57c6, 0x1000}}, 0x20) unshare(0x8020400) r9 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r9, &(0x7f0000000000)) 19:08:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = accept(r1, &(0x7f0000000000)=@hci, &(0x7f00000000c0)=0x80) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) [ 1651.737065] hfs: unable to parse mount options [ 1651.742656] hfs: unable to load codepage "cp8?" [ 1651.747630] hfs: unable to parse mount options [ 1651.760761] Unknown ioctl 21545 19:08:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2000c004}, 0x4000001) 19:08:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) fstat(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@mcast2, 0x4e23, 0x7f, 0x4e20, 0x5e, 0xa, 0x20, 0x20, 0x2b, 0x0, r3}, {0xff, 0xa56, 0x552, 0x6, 0x7, 0xff, 0x20, 0x4}, {0xfffffffffffffffd, 0x5ebea257, 0x7, 0xa62}, 0x7, 0x0, 0x1, 0x0, 0x1, 0x3}, {{@in6=@ipv4={[], [], @multicast1}, 0x4d4, 0x2b}, 0x2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x1, 0x0, 0x81, 0x8, 0x2}}, 0xe8) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) [ 1651.866589] hfs: unable to parse mount options 19:08:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000140)={0x6, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x40000, 0x0) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x5, 0x3ff, 0xff, 0xfffffff8], 0x4, 0x80000, r1, r4}) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1651.959056] hfs: unable to load codepage "cp8?" [ 1651.974254] hfs: unable to parse mount options 19:08:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sync_file_range(0xffffffffffffffff, 0x100000001, 0x6, 0x1) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 1652.007428] Unknown ioctl 21545 19:08:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000140), 0x4) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="706167653d63703733372c000000f0ffffffffffffff003bfc6b3d2a8be0f0467cf81e7877b1c452270b2192cc12ddfe9644a93375fb5a51ec0636dad5d1d8bd7bdb671f833c3864e448e09471ed33e9f2b83fd9db53cbceac3a42442e3f42b2c0c0395e97d2edef05217d73f858c04ea75988eccabf95806e6dfcfcaf6d2c9245896df06abe9e351090acc7189670a40145aa94eb1ff59f75361e42"]) [ 1652.225629] hfs: unable to parse mount options [ 1652.322720] hfs: unable to parse mount options 19:08:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) mq_notify(0xffffffffffffffff, &(0x7f0000000000)) 19:08:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x200, 0x70bd29, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2000c004}, 0x4000001) 19:08:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x2, &(0x7f0000000140)=[{&(0x7f00000000c0)="18a9833cfe56309fa75c6f905a29f0a7d4abe729871530653cd568d2147bd40a781fcc26dbfd84bcfa94082b6dcad71b1f59fa4741190d41904ce069385059ccd68eeda6a7", 0x45, 0x6}, {&(0x7f0000000240)="91964f668ab82d6669dd1fd3e01b6a7b84bfd580e3ac223bb282404e969acf8c627447d1db967588fb0c5702905e7f644a96ab36b1fc2cc533dc6f08b99744d6033ec473f5ce601071187f37b8ae89c3c6eda90c134c7ed1f72aec63eda7bf06ec7fef20bdb388e3492de6e949a536064d0968d36096c6b5cbccecc4bb3d394c6a32202591e5c79e992abf1baf518c6833113621f262ff20de6458d941e6baea55a8b9c19123dc9897484c7caa8f19cb8dc09142a1a49c7a4622c20cfdfe5c5cfa7de8d13388", 0xc6, 0x200000000000000}], 0x1004000, &(0x7f00000003c0)={[], [{@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, 'user'}}, {@subj_user={'subj_user', 0x3d, '{!$'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r1}}, {@appraise_type='appraise_type=imasig'}]}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/schedstat\x00', 0x0, 0x0) connect$caif(r2, &(0x7f0000000340)=@dgm={0x25, 0x5, 0x9}, 0x18) 19:08:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) pkey_alloc(0x0, 0x2) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000140), 0x4) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="706167653d63703733372c000000f0ffffffffffffff003bfc6b3d2a8be0f0467cf81e7877b1c452270b2192cc12ddfe9644a93375fb5a51ec0636dad5d1d8bd7bdb671f833c3864e448e09471ed33e9f2b83fd9db53cbceac3a42442e3f42b2c0c0395e97d2edef05217d73f858c04ea75988eccabf95806e6dfcfcaf6d2c9245896df06abe9e351090acc7189670a40145aa94eb1ff59f75361e42"]) 19:08:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x40000025, 0x0, [0x0]}) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x2, &(0x7f0000000040)=0x2) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{@fixed}]}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000440)={0x27, 0x16f94fac, 0x4, 0x7ff, 0x2, 0x8000}) openat$cgroup_type(r3, &(0x7f0000000240)='cgroup.type\x00', 0x2, 0x0) accept$ax25(r2, &(0x7f00000002c0)={{0x3, @bcast}, [@bcast, @netrom, @netrom, @rose, @default, @netrom]}, &(0x7f0000000340)=0x48) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000001740)=ANY=[@ANYBLOB="00898344da010000779022d845ad1f3f8c078e3ae71c53704febd7e27c09e25d471f7cbfd99e20e8caf740e2127472f6a4d6609cb96769e0da4995675e295c6ec8a39099397e88823d9b482cfd9fcf1c6ba309811f61fae36c33c23ecfc99c060167fc6fc5ce8e95"]) recvfrom$ax25(r4, &(0x7f0000001640)=""/123, 0x7b, 0x1, &(0x7f00000016c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) openat$vfio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vfio/vfio\x00', 0x218180, 0x0) r5 = syz_open_dev$admmidi(&(0x7f0000001ac0)='/dev/admmidi#\x00', 0x80000000, 0x2000) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=r6], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x5) setsockopt$inet6_mtu(r5, 0x29, 0x17, 0x0, 0x0) pipe(&(0x7f00000003c0)) r7 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r7, 0x1, 0x1, &(0x7f0000000140), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001800)={0x0, r7, 0x0, 0x5, &(0x7f00000017c0)='IPVS\x00'}, 0x30) r9 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffff}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r9, 0x1, 0x1, &(0x7f0000000140), 0x4) r10 = syz_open_dev$admmidi(&(0x7f0000001ac0)='/dev/admmidi#\x00', 0x80000000, 0x2000) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r10, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=r11], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x5) setsockopt$inet6_mtu(r10, 0x29, 0x17, 0x0, 0x0) r12 = dup(r0) pwritev(r5, &(0x7f0000001600)=[{&(0x7f0000000600)="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", 0x1000}], 0x1, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="636f6465706167653d63703835372c3e05a4b00a6c636f6465706167653d63703733372c00"]) [ 1652.668429] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1652.692208] hfs: unable to parse mount options [ 1652.708393] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 19:08:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000280), &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) timer_create(0x6, &(0x7f0000000000)={0x0, 0x15, 0x1}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {r2, r3+30000000}}, &(0x7f0000000140)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000000206010000001d0000000000000000000c00030068617368050004000028107ba1626b669e797a30000000000500050002000000050001000600000000000000"], 0x44}}, 0x0) [ 1652.728509] hfs: unable to load codepage "cp8?" [ 1652.733625] hfs: unable to parse mount options [ 1652.757991] Unknown ioctl 21545 [ 1652.766366] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 19:08:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$int_out(r2, 0x0, &(0x7f0000000040)) 19:08:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)) [ 1652.822743] hfs: unable to parse mount options [ 1652.833945] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 1652.866587] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1652.881314] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 1652.889825] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1652.899568] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 1652.911912] hfs: unable to change codepage 19:08:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) unshare(0x8000400) r6 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000140), 0x4) statx(r2, &(0x7f00000002c0)='./file0\x00', 0x800, 0x400, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r8, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) statx(r10, &(0x7f0000000500)='./file0\x00', 0x800, 0x20, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./bus\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r12, 0x0) fsetxattr$system_posix_acl(r6, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x1}, [{0x2, 0x2, r7}], {0x4, 0x2}, [{0x8, 0x0, r8}, {0x8, 0x2, r9}, {0x8, 0xd, r11}, {0x8, 0x1, r12}], {0x10, 0x5}, {0x20, 0x6}}, 0x4c, 0x3) mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f00000001c0)) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r13+30000000}, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1652.916632] hfs: unable to parse mount options 19:08:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000001ac0)='/dev/admmidi#\x00', 0x80000000, 0x2000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=r2], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x5) setsockopt$inet6_mtu(r1, 0x29, 0x17, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r4) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x4000, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x140c, 0x4, 0x70bd2c, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x20008001}, 0x48000) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) unshare(0x8020400) bind(r0, &(0x7f0000000080)=@un=@abs={0x0, 0x0, 0x4e24}, 0x80) r7 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r7, &(0x7f0000000000)) [ 1652.969971] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1652.984639] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 1652.993065] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1653.007581] hfs: unable to load codepage "cp8?" [ 1653.013260] hfs: unable to parse mount options [ 1653.029891] Unknown ioctl 21545 19:08:27 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x20001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 19:08:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) 19:08:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={0x14, 0x2, 0x6, 0x1}, 0x14}}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000004c0), 0x106, 0x8}}, 0x20) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r5 = syz_open_dev$admmidi(&(0x7f0000001ac0)='/dev/admmidi#\x00', 0x80000000, 0x2000) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="d0001000710923814cdf634c68044995d5caab6d5907ec2596c29aa05eec8382cbf5897a15d7fe39e45a342a104106854d211367468a6e387347254643e3e9b44559b4afaeb35fc72578b2155aafba43a9920f4675c75f9796ac559b5ee2f0a592c6ae893fc3aa53f135c8f8e50e82cffb545e3a81636db90f6cda5455b5bf97a8a3f545e6587653266c390d9d301969114d131e2d97070360537b9028c9dde4acdc349aaee06da9be31e228cdf5ca41838540dac1d70881314e4b56140abb32962d9c44999ac94e58d9fcb0030b72ac5e51933dc95626aa210545df893c848725c1e5228a2689bb5b20d5a6ea7f2a062b28d10c1670aecab96cb76b617a2e6fef9a1c5b", @ANYRES16=r6], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x5) setsockopt$inet6_mtu(r5, 0x29, 0x17, 0x0, 0x0) poll(&(0x7f0000000540)=[{r0, 0x2004}, {r3, 0x300}, {r4, 0x3}, {r0, 0x6}, {r5, 0x24}, {r0, 0x8100}], 0x6, 0x7) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f00000000c0)={0x3f0000, 0x6, 0x7, r0, 0x0, &(0x7f0000000040)={0x9909d9, 0x10000, [], @p_u8=&(0x7f0000000000)=0x2}}) fcntl$addseals(r0, 0x409, 0x8) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x208, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x68, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10001}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x14b}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_BEARER={0x94, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7, @mcast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x400}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2e7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffd}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) [ 1653.174019] hfs: unable to change codepage [ 1653.196547] hfs: unable to parse mount options 19:08:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x44}}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80820c}, 0xc, &(0x7f0000000040)={&(0x7f00000003c0)={0x224, 0x1, 0x2, 0x201, 0x0, 0x0, {0xa, 0x0, 0x9}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_NAT={0x1f8, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0xd4, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x1d}}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @rand_addr="93cc13530b8ef3b30e6dbf20f724809e"}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @mcast2}}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0xa0, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr="efbe95552cd1665ef6ed4798a9dbf791"}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0xfff8}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0xc}}, {0x8, 0x2, @rand_addr=0x6}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xc}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xf8}]}, 0x224}, 0x1, 0x0, 0x0, 0x4000055}, 0x4000) [ 1653.267487] hfs: unable to load codepage "cp8?" [ 1653.273568] hfs: unable to parse mount options [ 1653.287935] hfs: unable to change codepage [ 1653.296196] hfs: unable to parse mount options 19:08:27 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x30}}, 0x4000014) 19:08:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) 19:08:27 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1653.466094] hfs: unable to change codepage [ 1653.472498] hfs: unable to parse mount options [ 1653.485993] hfs: unable to load codepage "cp8?" [ 1653.491252] hfs: unable to parse mount options [ 1653.507698] hfs: unable to change codepage [ 1653.513183] hfs: unable to parse mount options 19:08:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000280), &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) timer_create(0x6, &(0x7f0000000000)={0x0, 0x15, 0x1}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {r2, r3+30000000}}, &(0x7f0000000140)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000000206010000001d0000000000000000000c00030068617368050004000028107ba1626b669e797a30000000000500050002000000050001000600000000000000"], 0x44}}, 0x0) 19:08:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$USBDEVFS_GET_CAPABILITIES(r0, 0x8004551a, &(0x7f0000000000)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 19:08:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000080)=0xfffffff7, 0x4) mq_notify(r2, &(0x7f0000000000)) [ 1653.807639] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 19:08:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) 19:08:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x3, r1, 0x1}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000002c0)) recvfrom$inet(r2, &(0x7f0000000040)=""/160, 0xa0, 0x18060, &(0x7f0000000100)={0x2, 0x4e22, @local}, 0x10) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB="636f6465706167653d63703819372c636f6465706167653d63703733376c00"]) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x20, 0x2, 0x7, 0x5, 0x0, 0x0, {0xc, 0x0, 0x9}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8080) 19:08:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x2, &(0x7f0000000140)=[{&(0x7f00000000c0)="18a9833cfe56309fa75c6f905a29f0a7d4abe729871530653cd568d2147bd40a781fcc26dbfd84bcfa94082b6dcad71b1f59fa4741190d41904ce069385059ccd68eeda6a7", 0x45, 0x6}, {&(0x7f0000000240)="91964f668ab82d6669dd1fd3e01b6a7b84bfd580e3ac223bb282404e969acf8c627447d1db967588fb0c5702905e7f644a96ab36b1fc2cc533dc6f08b99744d6033ec473f5ce601071187f37b8ae89c3c6eda90c134c7ed1f72aec63eda7bf06ec7fef20bdb388e3492de6e949a536064d0968d36096c6b5cbccecc4bb3d394c6a32202591e5c79e992abf1baf518c6833113621f262ff20de6458d941e6baea55a8b9c19123dc9897484c7caa8f19cb8dc09142a1a49c7a4622c20cfdfe5c5cfa7de8d13388", 0xc6, 0x200000000000000}], 0x1004000, &(0x7f00000003c0)={[], [{@dont_hash='dont_hash'}, {@subj_type={'subj_type', 0x3d, 'user'}}, {@subj_user={'subj_user', 0x3d, '{!$'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r1}}, {@appraise_type='appraise_type=imasig'}]}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/schedstat\x00', 0x0, 0x0) connect$caif(r2, &(0x7f0000000340)=@dgm={0x25, 0x5, 0x9}, 0x18) 19:08:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x8020400) r3 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r3, &(0x7f0000000000)) 19:08:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000020601000000000000000000000000000c000300686173683a697000050004005ee3000000000900020073797a30000000d6f5bbdb00020000000500010006000000"], 0x44}}, 0x0) [ 1653.972426] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 19:08:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4400, 0x81) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000000c0)={[0x6, 0x4c75, 0x1, 0x8, 0x3, 0x8, 0x100, 0x9, 0x1, 0x9eafe03, 0x1ff, 0x3d4, 0x1, 0x35a, 0x4, 0x6], 0x1, 0x158000}) [ 1654.015672] hfs: unable to load codepage "cp8?" [ 1654.024845] hfs: unable to parse mount options 19:08:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) [ 1654.063936] hfs: unable to load codepage "cp87" [ 1654.068756] hfs: unable to parse mount options 19:08:28 executing program 4: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000140), 0x4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x4, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000140), 0x4) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) inotify_add_watch(r2, &(0x7f0000000200)='./file0/bus\x00', 0x180) splice(r0, &(0x7f0000000000)=0x8fba, r1, &(0x7f0000000040)=0x9, 0xce1, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x6) prctl$PR_GET_SECUREBITS(0x1b) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000240)) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) 19:08:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x40000, 0x22}, 0x10}, 0x78) r3 = syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0x7ff, 0x40020) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000480)={0x8, 0x3, 0x5}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r2) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000180)={0x9b0000, 0x0, 0x7b8, r2, 0x0, &(0x7f0000000140)={0x203e0, 0x6, [], @p_u8=&(0x7f0000000040)=0xff}}) bind$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x3d, @empty, 0x8000}, 0x1c) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000000206030000ee63a9fa41c1030ed930ab"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) readlinkat(r6, &(0x7f0000000280)='./file0\x00', &(0x7f0000000600)=""/200, 0xc8) sendto$llc(r5, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r5, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r5, &(0x7f0000001380), 0x40003ad, 0x2000000) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000000)={0x8, 0x1, 0x4, 0x20, 0x943e, 0x5}) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r7, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r7, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r7, &(0x7f0000001380), 0x40003ad, 0x2000000) signalfd4(r7, &(0x7f0000000300)={[0x5]}, 0x8, 0x0) [ 1654.259742] hfs: unable to load codepage "cp8?" [ 1654.264748] hfs: unable to parse mount options 19:08:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000280), &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1c0000000, 0x0) timer_create(0x6, &(0x7f0000000000)={0x0, 0x15, 0x1}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {r2, r3+30000000}}, &(0x7f0000000140)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="440000000206010000001d0000000000000000000c00030068617368050004000028107ba1626b669e797a30000000000500050002000000050001000600000000000000"], 0x44}}, 0x0) 19:08:28 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r1 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r2, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000100)={0xa0, 0x0, 0x6, {{0x4, 0x1, 0x100, 0x172, 0xffffffff, 0xb3, {0x4, 0x1, 0x100000000, 0xd2be, 0xffffffff, 0x7f, 0x3ff, 0xfffffffe, 0x8, 0x7537, 0x8, r2, 0x0, 0x0, 0x6}}, {0x0, 0xf6ed35d3c9404b9}}}, 0xa0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/209) unshare(0x8020400) r5 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r5, &(0x7f0000000000)={0x0, 0x0, 0x2}) accept4$rose(r4, &(0x7f0000000080)=@short={0xb, @dev, @default, 0x1, @netrom}, &(0x7f00000000c0)=0x68, 0x80800) 19:08:28 executing program 2: unshare(0x8000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='mqueue\x00', 0x0, 0x0) exit(0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r2, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x40003ad, 0x2000000) ioctl$sock_proto_private(r2, 0x89e7, &(0x7f0000000440)="cf43411045b370c361fc08120389d6833fad80269b96ab64ee08558e1559d3b2caa83ca256aa020a1715ddf399066a3eaaaad84809bcc36c38708b968850d118529d89eb88fc537a605f3c3e049c91bd255b49bf5b4132bfe8611edada49cef58eb1f44a30480835cb4131d64132bc6bd17d2bb22186e3f247c8386cc33dde212b1b60864b8fb0f6718635d091202641ce5deea1e5c212eae448c2ca189f394a326a3070f003a7a55a86b0aa26d45ef347e9a97906c70791d81041e76ff126e6c7489ed43f4e280d1f54aeebbb29") r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="16c6c45db987d333000057", @ANYRES16=r3, @ANYBLOB="9db2b1dad270b1e805beae06861116e6803b32fd401538fb1b605786c92e256622e70e865a2aad32a47d1ccb000000000000"], 0x3}}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x238, r3, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa769}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3ff000}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xd2bd}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3d}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_SOCK={0x84, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xdaa}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xafe}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x88c}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xace}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffc01}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffff81}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf145}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7dcc}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x380000000}]}, @TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2282}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) 19:08:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$netlink(0xffffffffffffffff, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd, 0x20000000}, 0xc) syz_mount_image$hfs(&(0x7f0000000300)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff80000000, 0x0, 0x0, 0x8000, &(0x7f0000000340)={[{@file_umask={'file_umask', 0x3d, 0x92e}}, {@umask={'umask', 0x3d, 0x9}}]}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000480)='SMC_PNETID\x00') r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f00000000c0)=0x23, 0x4) sendmsg$SMC_PNETID_ADD(r3, &(0x7f0000000640)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r4, 0x2, 0x0, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x8000) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="8c000000501a7e956c50d01b0effc18605618bca23de3592a8b663e5cdfee88a117bc3b57ae753b9d0a25e8db88ee52e10d31d5665fe08", @ANYRES16=r4, @ANYBLOB="020029bd7000ffdbdf250400000005000400020000000900030073797a300000000014000200627269646765300000000000000000000900030073797a8643b530000000000900030073797a30000000000900030073797a31000000000900010073797a31000000000900030073797a31000000001400020076657468315f746f5f68737200000000"], 0x8c}, 0x1, 0x0, 0x0, 0x840}, 0x40088d0) 19:08:28 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) [ 1654.532490] hfs: unable to load codepage "cp8?" [ 1654.537408] hfs: unable to parse mount options [ 1654.550551] Unknown ioctl 19296 19:08:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x21000000400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1654.634656] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1654.673587] hfs: unable to load codepage "cp8?" [ 1654.678457] hfs: unable to parse mount options [ 1654.704365] hfs: unable to change codepage [ 1654.708893] hfs: unable to parse mount options 19:08:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = fcntl$getown(0xffffffffffffffff, 0x9) ioprio_get$pid(0x1, r2) r3 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r4 = shmget(0x0, 0x1000, 0x1000, &(0x7f0000ffd000/0x1000)=nil) r5 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r6, 0x0) r7 = getegid() r8 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r9, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r12 = getpid() sched_setattr(r12, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000140)={{0x2, r6, r7, r9, r10, 0x92, 0xc2c3}, 0x10000, 0xf53, 0x3eb3, 0x5, r11, r12, 0x8}) mq_notify(r3, &(0x7f0000000000)) [ 1654.753376] hfs: unable to change codepage [ 1654.757865] hfs: unable to parse mount options [ 1654.810939] hfs: unable to load codepage "cp8?" 19:08:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_buf(r0, 0x29, 0x2f, &(0x7f0000002180)=""/137, &(0x7f0000002240)=0x89) r2 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r2, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x40003ad, 0x2000000) openat$fuse(0xffffffffffffff9c, &(0x7f0000001800)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002140)='/dev/fuse\x00', 0x2, 0x0) recvmmsg(r2, &(0x7f0000001f40)=[{{&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/127, 0x7f}, {&(0x7f00000002c0)=""/202, 0xca}], 0x2, &(0x7f0000000140)=""/98, 0x62}, 0x2}, {{&(0x7f0000000200)=@x25={0x9, @remote}, 0x80, &(0x7f00000014c0)=[{&(0x7f00000003c0)=""/26, 0x1a}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/150, 0x96}], 0x3}, 0x101}, {{&(0x7f0000001500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001580)=""/234, 0xea}, {&(0x7f0000001680)=""/104, 0x68}, {&(0x7f0000001700)=""/126, 0x7e}, {&(0x7f0000001840)=""/199, 0xc7}, {&(0x7f0000001780)=""/117, 0x75}, {&(0x7f0000001940)=""/89, 0x59}, {&(0x7f00000019c0)=""/121, 0x79}, {&(0x7f0000001a40)=""/181, 0xb5}, {&(0x7f0000001b00)=""/33, 0x21}], 0x9, &(0x7f0000001c00)=""/172, 0xac}, 0x400}, {{&(0x7f0000001cc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001d40)=""/226, 0xe2}, {&(0x7f0000001e40)=""/78, 0x4e}], 0x2, &(0x7f0000001f00)=""/51, 0x33}, 0x2}], 0x4, 0x101, &(0x7f0000002040)={0x77359400}) getsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000002080), &(0x7f00000020c0)=0x4) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="636f6465706167653d63703835372c636f64655feae312aa945a32706167653d63703733372c00"]) [ 1654.831394] hfs: unable to parse mount options [ 1654.878878] hfs: unable to parse mount options [ 1654.922118] hfs: unable to parse mount options 19:08:29 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$netlink(0xffffffffffffffff, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd, 0x20000000}, 0xc) syz_mount_image$hfs(&(0x7f0000000300)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff80000000, 0x0, 0x0, 0x8000, &(0x7f0000000340)={[{@file_umask={'file_umask', 0x3d, 0x92e}}, {@umask={'umask', 0x3d, 0x9}}]}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000480)='SMC_PNETID\x00') r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f00000000c0)=0x23, 0x4) sendmsg$SMC_PNETID_ADD(r3, &(0x7f0000000640)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r4, 0x2, 0x0, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x8000) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="8c000000501a7e956c50d01b0effc18605618bca23de3592a8b663e5cdfee88a117bc3b57ae753b9d0a25e8db88ee52e10d31d5665fe08", @ANYRES16=r4, @ANYBLOB="020029bd7000ffdbdf250400000005000400020000000900030073797a300000000014000200627269646765300000000000000000000900030073797a8643b530000000000900030073797a30000000000900030073797a31000000000900010073797a31000000000900030073797a31000000001400020076657468315f746f5f68737200000000"], 0x8c}, 0x1, 0x0, 0x0, 0x840}, 0x40088d0) 19:08:29 executing program 0: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) [ 1655.014783] hfs: unable to load codepage "cp8?" [ 1655.019851] hfs: unable to parse mount options 19:08:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x52b00}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x20000015) 19:08:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000040)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000100000000000cbec2fcb980b70425731df6fd68da2d6297eca2ab8db1aa8f98451ced3f931f70c8d3320c6bc4040757203303256e5faccca0e979e7357677488d29151e2d841af18fcf2d351a07d316ab8a9867f56ab5c0288caa1ca51ca0f9fa1082ee9a6ac4457b2130f4d6614f1fe88bb43ad13b799fb844d22ab261415795f8d15db699744cb0c25d1e3a3dec0526527afcb6f8bb5"]) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @timestamp], 0x2) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000080)={0xa, {0x6, 0x6, 0x0, 0x7}, {0x40, 0x7, 0x4, 0x8}, {0xfffffffb, 0xffff32d2}}) 19:08:29 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = socket(0xf, 0x7, 0x1f) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @empty}}, 0x3, 0x3, 0x9, 0x77, 0x10001}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r2, &(0x7f0000000140)=0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:29 executing program 0: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080)="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", &(0x7f0000001080)="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"}}) 19:08:29 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$netlink(0xffffffffffffffff, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd, 0x20000000}, 0xc) syz_mount_image$hfs(&(0x7f0000000300)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff80000000, 0x0, 0x0, 0x8000, &(0x7f0000000340)={[{@file_umask={'file_umask', 0x3d, 0x92e}}, {@umask={'umask', 0x3d, 0x9}}]}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000480)='SMC_PNETID\x00') r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f00000000c0)=0x23, 0x4) sendmsg$SMC_PNETID_ADD(r3, &(0x7f0000000640)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r4, 0x2, 0x0, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x8000) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="8c000000501a7e956c50d01b0effc18605618bca23de3592a8b663e5cdfee88a117bc3b57ae753b9d0a25e8db88ee52e10d31d5665fe08", @ANYRES16=r4, @ANYBLOB="020029bd7000ffdbdf250400000005000400020000000900030073797a300000000014000200627269646765300000000000000000000900030073797a8643b530000000000900030073797a30000000000900030073797a31000000000900010073797a31000000000900030073797a31000000001400020076657468315f746f5f68737200000000"], 0x8c}, 0x1, 0x0, 0x0, 0x840}, 0x40088d0) [ 1655.363933] hfs: unable to load codepage "cp8?" [ 1655.369860] hfs: unable to parse mount options 19:08:29 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$netlink(0xffffffffffffffff, &(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd, 0x20000000}, 0xc) syz_mount_image$hfs(&(0x7f0000000300)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff80000000, 0x0, 0x0, 0x8000, &(0x7f0000000340)={[{@file_umask={'file_umask', 0x3d, 0x92e}}, {@umask={'umask', 0x3d, 0x9}}]}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000480)='SMC_PNETID\x00') r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f00000000c0)=0x23, 0x4) sendmsg$SMC_PNETID_ADD(r3, &(0x7f0000000640)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r4, 0x2, 0x0, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000041}, 0x8000) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="8c000000501a7e956c50d01b0effc18605618bca23de3592a8b663e5cdfee88a117bc3b57ae753b9d0a25e8db88ee52e10d31d5665fe08", @ANYRES16=r4, @ANYBLOB="020029bd7000ffdbdf250400000005000400020000000900030073797a300000000014000200627269646765300000000000000000000900030073797a8643b530000000000900030073797a30000000000900030073797a31000000000900010073797a31000000000900030073797a31000000001400020076657468315f746f5f68737200000000"], 0x8c}, 0x1, 0x0, 0x0, 0x840}, 0x40088d0) 19:08:29 executing program 0: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0xffffffd0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = getpgrp(0xffffffffffffffff) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) timer_create(0x4, &(0x7f0000000400)={0x0, 0x19, 0x4}, &(0x7f0000000440)=0x0) timer_getoverrun(r4) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000600)={0x2, 0x0, [0x0, 0x0]}) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r6, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r7 = accept$ax25(r6, &(0x7f0000000480)={{0x3, @netrom}, [@netrom, @rose, @default, @netrom, @netrom, @netrom, @bcast, @netrom]}, &(0x7f0000000640)=0x48) r8 = syz_open_dev$admmidi(&(0x7f0000001ac0)='/dev/admmidi#\x00', 0x80000000, 0x2000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r8, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x800}, 0x5) setsockopt$inet6_mtu(r8, 0x29, 0x17, 0x0, 0x0) sendfile(r7, r8, &(0x7f0000000540)=0x6, 0x80) chown(&(0x7f0000000140)='./file0\x00', r3, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={r1, r3, r9}, 0xc) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r10, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="48000000020601000000000010000300686173683a69702c6d61630005000400000000000900020073797a300000000005000500020000000500010006000000eeff7eca6c719d92af05113a04bb5c50d8d84c699a4c042d0080c18d1fe72df872d917ee7c534b2fe3f53a8e0000000000000000"], 0x48}}, 0x0) r11 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) r12 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r13, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r11, &(0x7f00000002c0)={0x78, 0x0, 0x2, {0x101, 0x4, 0x0, {0x3, 0x38, 0x5, 0x0, 0x5, 0x0, 0x400, 0x5, 0x1, 0x8, 0x7, r13, r14, 0x6, 0x1}}}, 0x78) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r15 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r15, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$BINDER_SET_CONTEXT_MGR(r15, 0x40046207, 0x0) [ 1655.459057] hfs: unable to change codepage [ 1655.473404] hfs: unable to parse mount options 19:08:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000000206010000000000000000000000000010000300686173683a69602c6d61630005000400000000000900020073797a300000000005000500020000000500010006000000"], 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 1655.567597] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1655.575277] hfs: unable to load codepage "cp8?" [ 1655.586789] hfs: unable to parse mount options 19:08:30 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000001ac0)='/dev/admmidi#\x00', 0x80000000, 0x2000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=r1], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x5) setsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000002c0)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d0000000000076900004713b2", @ANYRES32=r5, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getqdisc={0x28, 0x26, 0x300, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, r5, {0xd, 0xd}, {0xfff1}, {0x0, 0x7}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x402d) [ 1655.838867] hfs: unable to load codepage "cp8?" [ 1655.846872] hfs: unable to parse mount options 19:08:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101400, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000001ac0)='/dev/admmidi#\x00', 0x80000000, 0x2000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x5) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r3, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3d}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x10}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xe43}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x673}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x79a54bee}]}, 0x5c}, 0x1, 0x0, 0x0, 0x54}, 0x20001080) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r4, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) fcntl$getownex(r4, 0x10, &(0x7f0000000280)={0x0, 0x0}) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r8 = dup(r7) ioctl$SG_GET_ACCESS_COUNT(r8, 0x2289, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r6, r8, 0x0, 0x5, &(0x7f00000002c0)='syz0\x00', 0xffffffffffffffff}, 0x30) tgkill(r5, r9, 0x24) [ 1656.124023] hfs: unable to change codepage [ 1656.128835] hfs: unable to parse mount options 19:08:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) sendto$unix(r3, &(0x7f0000000000)="c4c96767f0fac268e0da91714f80f366312b675706547174ad83f61bf7573245a94d8d7c1621b92da3cd2e99b0771dd03f857b0536117f0520798aaf8d2b2046220bde39bb12fc7e13287b9933c1bb59f1597ef2c89a636d7e5536bd33ddf341b0b490e2022abba97822f688dbc6f5d68c36dddd6596397eea80a90b9c43012142e0d82a5d96c1", 0x87, 0x24000084, 0x0, 0x0) 19:08:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 19:08:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000080)={0x0, 0x400, 0x0, @thr={&(0x7f00000000c0)="aa8237dd13f8c2a14c69e4f9b29219fa10aee2", &(0x7f0000000100)="f3e70739b2c752deaa3a718eda3f8a05d4b048b6afe2f6d570faf5fb092cc79077a9c936a82fc2cf167c5d1f559ca769e7686dc3e0ad1fed63b204279e6e545090c9c0b1da"}}) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r3, 0x8004551a, &(0x7f0000000180)) 19:08:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:30 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) creat(&(0x7f0000000000)='./file0\x00', 0x1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x102, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) 19:08:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000400)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r11 = dup(r10) ioctl$SG_GET_ACCESS_COUNT(r11, 0x2289, &(0x7f0000000600)) sendmsg$AUDIT_LIST_RULES(r11, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x3f5, 0x120, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40440c0}, 0x44804) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) [ 1656.296779] hfs: unable to change codepage [ 1656.301400] hfs: unable to parse mount options 19:08:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) [ 1656.365403] hfs: unable to load codepage "cp8?" [ 1656.371543] hfs: unable to change codepage [ 1656.375931] hfs: unable to parse mount options [ 1656.397735] hfs: unable to parse mount options 19:08:30 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0xa4, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_MESH_CONFIG={0x1c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x1}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x1}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x2}]}, @NL80211_ATTR_MESH_ID={0x6d, 0x18, "6319c5e88db508893492fe101b7c35e59ec90641cfe4cd5aae02e2ddee792d69d00ba104ba95f529c7977c5269aff912edcb59d29483500a955bd925ebf93a379a2c02637fe66a2e8550446d1c507eeeebd2c23ad47bddf1bae714ab16589f69f92e8de65588ae1376"}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}]}, 0xa4}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) 19:08:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) bind$tipc(r1, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x10) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r6 = syz_open_dev$admmidi(&(0x7f0000001ac0)='/dev/admmidi#\x00', 0x80000000, 0x2000) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r6, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16=r7], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x5) ioperm(0x3ff, 0x6, 0x2) setsockopt$inet6_mtu(r6, 0x29, 0x17, 0x0, 0x0) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r8, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r6, &(0x7f0000000180)={r1, r8, 0xb0}) mq_notify(r2, &(0x7f0000000000)) [ 1656.459182] Unknown ioctl 4707 19:08:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000400)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r11 = dup(r10) ioctl$SG_GET_ACCESS_COUNT(r11, 0x2289, &(0x7f0000000600)) sendmsg$AUDIT_LIST_RULES(r11, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x3f5, 0x120, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40440c0}, 0x44804) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) 19:08:31 executing program 3: socket$inet6(0xa, 0x2, 0x1) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r2, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x40003ad, 0x2000000) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000440)={0xfffffff8, 0x0, 0x4, 0x400, 0x4, {0x77359400}, {0x2, 0x0, 0xfb, 0x2, 0x6, 0x72, "d5e9db9d"}, 0x1, 0x4, @fd=r1, 0x1eb8d0f8, 0x0, r2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) epoll_create(0xa) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0\x00', r8, 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000000)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}], [{@smackfsroot={'smackfsroot', 0x3d, 'hfs\x00'}}, {@permit_directio='permit_directio'}, {@euid_eq={'euid', 0x3d, r8}}, {@permit_directio='permit_directio'}, {@smackfshat={'smackfshat', 0x3d, 'cgroup'}}, {@appraise='appraise'}, {@uid_eq={'uid', 0x3d, r10}}, {@obj_user={'obj_user', 0x3d, '*GPLbdev}-em0selinux8]\x89['}}, {@appraise_type='appraise_type=imasig'}, {@smackfshat={'smackfshat', 0x3d, 'codepage'}}]}) r11 = socket$can_raw(0x1d, 0x3, 0x1) write$binfmt_script(r11, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\'proc/security'}, {}], 0xa, "5dc5c3759b176d1bc1a14c29e0a4596d67e1caeec0e854cfb1fb019729476f26c0098b683613243992378d39b4f758785a9f9423fbb64c5e4ab6c276"}, 0x57) 19:08:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x1f, 0x4, &(0x7f0000000400)=[{&(0x7f0000000240)="4ea0eec250426235a9e6071ba9024b2f54688c5c24f06aeb5a789eefa26a9a9b5d6219a46cb90ae3358ab2b8be32dbb49af26f3d715a18934879c1da5dc28a1537dc20702528ab3e0d2ef39cef1bf551c9cbf426c92d2d5a0266daf14449135cd064e7ddd387d2c315524e5c3031fd3ecf9ebe1193a06d3f776d717381bc205941bcfc799cfcbbcf7cdcfeb386893162b40c7ce343eb149e4aefd6b0ff0bed0ad0214165e42e0d588ecb2d3802e735ea4260d9663de8b3b010e0a6010123e661742fd38d830367c3a66f29fc1789123d0f77575d2552f8719d050b173b29b862d486bfa8a82da3457a8e1dd985870ad4895875239c23", 0xf6, 0x80000001}, {&(0x7f0000000140)="e37ff31869e789f1ec8d28b6ee60b3c1ffd3fc1ea7812d64eea7f6ec34abda40eff35f6aa5a3384bf1736e1cd1f4f2fc8f9bcc64d037fe67e39edc0aa1748e4a5b29beff06d8758905054c1ed6596c833f6ea2a34011bfb3fad2fc24a139492510", 0x61, 0x200}, {&(0x7f0000000340)="8f64331c69d7406055fd1df5aad75425058b9ec372f30cf1812263a5789038a799dca1725d8a3efe68cc19", 0x2b, 0x20}, {&(0x7f0000000380)="2b53af0927ccd3cfd576515da587a6ff771a4a815a9f596bb711156f581cea02678c96ffe22f26baea34a37d3344c8e7d91b028cf47beb691173619fbf25bc79f8e12b9aa86670d71d3feff43bc67fc35f2810f7ee59b41a7ccb9bacddd39b5ca6ffb2270680e3245ace0b9833d3498544d4902c5cba9f6d", 0x78}], 0x2000, &(0x7f0000000540)={[{@noautodefrag='noautodefrag'}, {@compress_force='compress-force'}, {@commit={'commit', 0x3d, 0xfffffffffffffeff}}, {@user_subvol_rm='user_subvol_rm_allowed'}, {@user_subvol_rm='user_subvol_rm_allowed'}, {@thread_pool={'thread_pool', 0x3d, 0x80000000}}]}) socket$nl_netfilter(0x10, 0x3, 0xc) [ 1656.573761] hfs: unable to load codepage "cp8?" [ 1656.578659] hfs: unable to parse mount options 19:08:31 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:31 executing program 2: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) [ 1656.738418] hfs: unable to change codepage [ 1656.749707] hfs: unable to parse mount options [ 1656.817986] Unknown ioctl 4707 19:08:31 executing program 5 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:31 executing program 2: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) [ 1656.886949] hfs: unable to load codepage "cp8?" [ 1656.892555] hfs: unable to parse mount options 19:08:31 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000400)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r11 = dup(r10) ioctl$SG_GET_ACCESS_COUNT(r11, 0x2289, &(0x7f0000000600)) sendmsg$AUDIT_LIST_RULES(r11, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x3f5, 0x120, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40440c0}, 0x44804) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:08:31 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x42) dup(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x1a1080, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)=0xfffffffe) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x6) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB="636f6465706167653d63703835372c636f6465706167653d6370373337319f"]) 19:08:31 executing program 2: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) 19:08:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r3 = dup(r2) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000600)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x50, r3, 0xf7747000) unshare(0x8020400) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r4, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e22}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x24000091) r5 = mq_open(&(0x7f0000000080)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x30, 0x0) mq_notify(r5, &(0x7f0000000000)) [ 1657.093504] FAULT_INJECTION: forcing a failure. [ 1657.093504] name failslab, interval 1, probability 0, space 0, times 0 19:08:31 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) [ 1657.093613] CPU: 0 PID: 3910 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0 [ 1657.093619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 19:08:31 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="000400000000fedbdf2502000000240004800500030005000000050003000000000005000300070000000500030005000000240004800500030000000000050003000100000005000300060000000500030001000000200008801c000780080005000000000008000500ad5d80540800060000000000f4000c8014000b8008000a005f6d000008000900000000001c000b80080009008979c24a08000a002a6b000008000900088c85223c000b8008000a0000000000080009000000000008000a0088da000008000900d5dbfa2508000a002c5b00000800090093e89076080009002a80f83844000b800800090039946e7c08000a003ffb000008000a0063200000080009000000000008000a000000000008000a000e0f00000800090081be0f6408000a00e38100000c000b800800090067913e3434000b80080009009bf0e93c08000900c62370260800fc3e0800099473f05408000a003313000000000000000000000000000053f2cd40db9825f792d8783b5d7f85f1321ebe565b9d4ad0bcfb7644dd6f00ae6cb68231a0e6846a3b0849ac752dff022ed8f98e3989ef9fefabaa0d34b88efe37c34b068c01142e99d4bfad6a1700f6b51740392271c238747800993c06537ed096de7cda0c2b4ef90aae47ae8f801f1e117c9007418c2d6016efa85d77f68bb01b41e656d2e65eaf4521ba5a5ec8f43944bcbffdf97e37b3f968b7dfc4471738161630a73a9b934fa13462210337cff037b39561c754f8248d454197513ff2576521e1e1"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000400)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r11 = dup(r10) ioctl$SG_GET_ACCESS_COUNT(r11, 0x2289, &(0x7f0000000600)) sendmsg$AUDIT_LIST_RULES(r11, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x3f5, 0x120, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40440c0}, 0x44804) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:31 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) [ 1657.093623] Call Trace: [ 1657.093639] dump_stack+0x13e/0x194 19:08:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$binfmt_elf32(r3, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x0, 0x7, 0x5, 0x50c00d29, 0x3, 0x0, 0x8, 0x2ba, 0x38, 0x2f0, 0x4, 0xffff, 0x20, 0x2, 0x73e5, 0x1000, 0x7a}, [{0x6, 0xd4a, 0x86d1, 0x80000000, 0x1, 0x0, 0x6, 0x3}, {0x60000000, 0x6a4c, 0x20b, 0x4000401, 0x8000, 0x960, 0x80000001, 0x1}], "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"}, 0x1078) [ 1657.093658] should_fail.cold+0x10a/0x14b [ 1657.093675] should_failslab+0xd6/0x130 [ 1657.093688] __kmalloc+0x71/0x7c0 [ 1657.093774] ? bit_cursor+0x95b/0x1700 [ 1657.093786] ? fb_get_color_depth.part.0+0xba/0x1c0 [ 1657.093807] bit_cursor+0x95b/0x1700 [ 1657.093825] ? bit_clear+0x460/0x460 [ 1657.093853] ? bit_clear+0x460/0x460 [ 1657.093864] ? fb_get_color_depth.part.0+0xba/0x1c0 [ 1657.093875] ? fb_get_color_depth+0x5a/0x70 [ 1657.093886] ? get_color+0x1b8/0x3a0 [ 1657.093900] fbcon_cursor+0x4be/0x690 [ 1657.093909] ? bit_clear+0x460/0x460 [ 1657.093932] set_cursor+0x1aa/0x220 [ 1657.093943] redraw_screen+0x56e/0x770 [ 1657.093957] ? con_flush_chars+0x80/0x80 [ 1657.093967] ? fbcon_set_palette+0x470/0x590 [ 1657.093979] fbcon_modechanged+0x59d/0x890 [ 1657.093989] ? fbcon_modechanged+0x2/0x890 [ 1657.094002] fbcon_event_notify+0x11a/0x1746 [ 1657.094016] ? lock_acquire+0x1ec/0x3f0 [ 1657.094030] notifier_call_chain+0x107/0x1a0 [ 1657.094046] blocking_notifier_call_chain+0x79/0x90 [ 1657.094056] fb_set_var+0xaad/0xc70 [ 1657.094066] ? fb_set_suspend+0x110/0x110 [ 1657.094079] ? lock_acquire+0x170/0x3f0 [ 1657.094086] ? lock_fb_info+0x1a/0x70 [ 1657.094097] ? lock_fb_info+0x1a/0x70 [ 1657.094107] ? __mutex_lock+0x36a/0x1470 [ 1657.094115] ? trace_hardirqs_on+0x10/0x10 [ 1657.094121] ? save_trace+0x290/0x290 [ 1657.094136] ? mutex_trylock+0x1a0/0x1a0 [ 1657.094153] ? do_fb_ioctl+0x36a/0x940 [ 1657.094166] do_fb_ioctl+0x3cc/0x940 [ 1657.094174] ? lock_downgrade+0x6e0/0x6e0 [ 1657.094182] ? fb_read+0x520/0x520 [ 1657.094194] ? avc_has_extended_perms+0x802/0xd40 [ 1657.094206] ? kstrtouint+0xe6/0x130 [ 1657.094214] ? avc_ss_reset+0x100/0x100 [ 1657.094226] ? get_pid_task+0x91/0x130 [ 1657.094238] ? __lock_acquire+0x5f7/0x4620 [ 1657.094247] ? lock_downgrade+0x6e0/0x6e0 [ 1657.094278] fb_ioctl+0xdd/0x130 [ 1657.094286] ? do_fb_ioctl+0x940/0x940 [ 1657.094296] do_vfs_ioctl+0x75a/0xfe0 [ 1657.094307] ? selinux_file_mprotect+0x5c0/0x5c0 [ 1657.094318] ? ioctl_preallocate+0x1a0/0x1a0 [ 1657.094337] ? security_file_ioctl+0x76/0xb0 [ 1657.094345] ? security_file_ioctl+0x83/0xb0 [ 1657.094355] SyS_ioctl+0x7f/0xb0 [ 1657.094363] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1657.094374] do_syscall_64+0x1d5/0x640 [ 1657.094388] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1657.094396] RIP: 0033:0x45c479 [ 1657.094400] RSP: 002b:00007fda09337c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1657.094410] RAX: ffffffffffffffda RBX: 00007fda093386d4 RCX: 000000000045c479 [ 1657.094415] RDX: 0000000020000340 RSI: 0000000000004601 RDI: 0000000000000004 [ 1657.094419] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1657.094424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1657.094429] R13: 00000000000002ef R14: 00000000004c5096 R15: 0000000000000000 [ 1657.163840] hfs: unable to change codepage [ 1657.163845] hfs: unable to parse mount options [ 1657.218485] Unknown ioctl 4707 [ 1657.224429] hfs: unable to load codepage "cp8?" [ 1657.224439] hfs: unable to parse mount options [ 1657.478125] hfs: unable to change codepage [ 1657.478130] hfs: unable to parse mount options 19:08:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r1, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x40003ad, 0x2000000) r2 = mq_open(&(0x7f0000000000)='!\x00', 0x80, 0x44, &(0x7f0000000040)={0x1, 0x3, 0x6, 0xd2}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)={0x81, 0x20, 0x5, 0x0, 0x0, [{{r0}, 0x2}, {{r0}, 0xb7f}, {{r1}, 0x401}, {{r2}, 0x6}, {{r0}, 0x7ff}]}) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) sendmsg$OSF_MSG_REMOVE(r2, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x12b4, 0x1, 0x5, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, [{{0x254, 0x1, {{0x1, 0x6}, 0x4, 0x7, 0x2, 0x1, 0x3, 'syz1\x00', "cca0adc228fc094131294801c24dcb375b39d4b97f7373f5f5acab0ec58421d0", "40490bfb632d493e8d2ee253bcd81cf02c7e6fefdab4d7b22a53c0c85190c48e", [{0xd284, 0x1ff, {0x2, 0x3}}, {0x2, 0x8, {0x3, 0x10001}}, {0x1, 0xa813, {0x0, 0x7}}, {0xff, 0x0, {0x1, 0x6ce}}, {0xfff9, 0x8, {0x2, 0x3}}, {0x2, 0xfff, {0x0, 0x9}}, {0x6, 0xfff9, {0x3, 0xf50}}, {0x8, 0x1f, {0x2, 0x2}}, {0x4, 0x0, {0x3, 0x101}}, {0x6, 0x8, {0x7185ca52fcf67b2, 0x4}}, {0x101, 0x0, {0x1, 0x20}}, {0x4, 0x400, {0x3, 0x6}}, {0x2, 0x6b, {0x1, 0x2}}, {0x1, 0x8001, {0x1}}, {0x3, 0x800, {0x3, 0x3}}, {0xe906, 0x2, {0x3, 0x2}}, {0x100, 0x77, {0x0, 0xc9fa}}, {0x1000, 0x7, {0x0, 0x6226}}, {0x80, 0x5d5f, {0x3, 0x7}}, {0x2, 0x1, {0x0, 0x3f}}, {0x7, 0xec8, {0x1, 0xffffffe1}}, {0xed3b, 0x7f, {0x0, 0x8001}}, {0x3, 0x6, {0x2, 0xaf79}}, {0x3, 0x6, {0x2, 0xe608}}, {0x8c59, 0x3, {0x3, 0x80000001}}, {0x2, 0x5, {0x2, 0x91ce}}, {0x400, 0xf870, {0x2, 0xfffffffb}}, {0x45d4, 0x7ff, {0xff7b6ac33d603659, 0x4}}, {0x20, 0xfc00, {0x1, 0x8}}, {0x1, 0x1, {0x2, 0x5}}, {0x3, 0x6, {0x3, 0x9}}, {0x3, 0x4, {0x1, 0x1}}, {0x800, 0x80, {0x1, 0x4}}, {0xaa, 0xffe5, {0x2, 0x3}}, {0x63, 0x3ff, {0x0, 0xca8}}, {0x23, 0x47, {0x3, 0x10000}}, {0x7, 0x15, {0x3, 0x400}}, {0x6, 0x5, {0x1, 0xffffffc1}}, {0x4, 0x3ff, {0x0, 0x100}}, {0x1, 0x2d, {0x3, 0x731}}]}}}, {{0x254, 0x1, {{0x1, 0x3}, 0x5, 0xff, 0x6, 0x1, 0x20, 'syz1\x00', "d1ebcac210fa9d5a6af7bf85f32133dbd6e5671832c44ac8e6dfa7fd4c7f860b", "968f6ca28147c69c484400457e0c66c8908c947ee61d1323b5e4e33e16da1d0e", [{0x1, 0x1f, {0x3, 0xffff}}, {0x7a1, 0xff01, {0x2, 0x3}}, {0x3, 0xf9d, {0x2, 0x4}}, {0x8, 0x8, {0x0, 0x5}}, {0x3f, 0x0, {0x0, 0xfffffffe}}, {0x8, 0x6, {0x3, 0x7a}}, {0x3, 0x800, {0x3, 0xcd}}, {0x3, 0x4, {0x1, 0x40}}, {0x9, 0x6, {0x1, 0x1ff}}, {0x40, 0x6, {0x1, 0x7f}}, {0x5, 0x1, {0x0, 0x81}}, {0x6, 0x0, {0x0, 0x7fffffff}}, {0xf298, 0x9, {0x0, 0x7}}, {0xbf, 0x0, {0x0, 0x86c}}, {0x7f, 0x3, {0x0, 0xff}}, {0x1, 0x1, {0x0, 0x98c}}, {0xffff, 0x2, {0x2, 0xcdb2}}, {0x0, 0x4, {0x0, 0x3}}, {0x2, 0x8000, {0x1}}, {0x4, 0x0, {0x3, 0x8}}, {0x4000, 0x1ff, {0x0, 0xfffffffb}}, {0x5460, 0x2, {0x2, 0x97ed}}, {0x4, 0x400, {0x3, 0x3}}, {0x3, 0xb4, {0x3, 0x9}}, {0x63, 0xa6c, {0x1, 0x3f}}, {0x792, 0x4, {0x3, 0xffff8eed}}, {0x4, 0x0, {0x2, 0x4}}, {0x1, 0xff, {0x3, 0x401}}, {0x1, 0x7fff, {0x2}}, {0x6, 0x8, {0x2, 0xfff80000}}, {0x6, 0xfff, {0x3, 0x2}}, {0x9, 0x27e, {0x2, 0x8001}}, {0x78c3, 0x8, {0x1, 0x8d}}, {0x6, 0x37e, {0x3, 0x1}}, {0x2, 0x2168, {0x3, 0x6}}, {0xfbff, 0x3, {0x0, 0x2000000}}, {0x3c3a, 0x0, {0x2, 0x8}}, {0x5, 0x7, {0x3, 0x2}}, {0x30, 0x9, {0x2, 0x6}}, {0x3, 0x0, {0x7, 0x87}}]}}}, {{0x254, 0x1, {{0x2, 0x8001}, 0xc9, 0x13, 0x7, 0x0, 0x13, 'syz1\x00', "dc9d64a7ae0e333cc9ae608efcfc5e690eb2e3d5c042485c665b33b97f7d4ec6", "1fd41de00ecdaf3ecf49f7b9e0aa0874f3568a9f18ef06e97ee5b985cbb1ba08", [{0x80, 0x101, {0x0, 0x3}}, {0x401, 0xe5, {0x2, 0xffff}}, {0x0, 0x9, {0x1, 0x1}}, {0xfffc, 0x40, {0x3, 0x26e6}}, {0xfdeb, 0x7, {0x0, 0x10000}}, {0x1, 0x8, {0x2, 0x3}}, {0x8, 0x400, {0x1, 0x7f}}, {0x1, 0x3, {0x1, 0x8}}, {0xe4, 0x8, {0x3, 0x10000}}, {0x6a, 0x7, {0x2, 0x2}}, {0x8, 0x3, {0x0, 0x320e4c77}}, {0x9, 0x2, {0x1, 0x1f}}, {0x9f2, 0x20, {0x2, 0x7fff}}, {0x7fff, 0x204c, {0x3, 0x9}}, {0xac9, 0x6, {0x3, 0x2}}, {0x8, 0x80f, {0x0, 0x7}}, {0x7, 0x4, {0x3}}, {0xfa91, 0xff7, {0x1, 0x2}}, {0x8, 0x1, {0x1, 0xc1}}, {0x8, 0x1, {0x3, 0x7}}, {0x1, 0x3, {0x0, 0xffff}}, {0x3b6, 0xc81, {0x3, 0x2}}, {0x3, 0x1, {0x3, 0x80}}, {0x200, 0x183a, {0x0, 0x2}}, {0x3ff, 0x0, {0x1, 0x4}}, {0x8000, 0x101, {0x3, 0x6288}}, {0x6, 0x3, {0x0, 0xffffffff}}, {0x2, 0x2, {0x1, 0x800}}, {0xff, 0x9, {0x1, 0x80}}, {0x80, 0x8000, {0x3, 0x1000}}, {0xfff7, 0x5, {0x0, 0x7fffffff}}, {0x5, 0x7, {0x1, 0x3}}, {0x9, 0x3, {0x0, 0x81}}, {0xfff, 0x3, {0x0, 0x80}}, {0x270, 0x5}, {0x7ff, 0x2, {0x0, 0xfffffff8}}, {0x1f, 0x800, {0x3, 0x4c1}}, {0x1, 0x4, {0x0, 0x4}}, {0xaf59, 0x3f, {0x3, 0xfffffffc}}, {0x6, 0x4, {0x2, 0x1058}}]}}}, {{0x254, 0x1, {{0x2}, 0x9, 0x6, 0xfff, 0x1ff, 0xa, 'syz1\x00', "4861bcbd52c2a6ad22f30b22fe60e4fc8d8e44e6a06f937174ca1262b607024c", "588e0ef922d8b05665e74ba717f26cb05f58800e6361d908c4d61a57e688d50b", [{0x7f, 0x249, {0x3, 0x4a}}, {0x3, 0xfff8, {0x2, 0x4}}, {0x8001, 0x1ec, {0x3, 0x9254}}, {0x9c69, 0x3f, {0x0, 0x100}}, {0x2, 0x401, {0x3, 0x3d4}}, {0xfffe, 0x3, {0x3, 0x1}}, {0x2, 0x4, {0x1, 0x3}}, {0x6, 0xfff, {0x3, 0x2}}, {0x6, 0x3195, {0x2, 0xffffffff}}, {0x8, 0x3, {0x1, 0x10001}}, {0x5, 0x0, {0x2, 0xd10a}}, {0xfff, 0x3800, {0x1, 0x10001}}, {0xa4b, 0x7ff, {0x1, 0xfffffffa}}, {0x2, 0x8, {0x2, 0x6}}, {0x200, 0x2c8, {0x2, 0x1}}, {0x8001, 0x9, {0x2, 0x10000}}, {0x8, 0x80, {0x3, 0xff}}, {0x3, 0xdef5, {0x1, 0x400}}, {0x8, 0x2, {0x0, 0x4488770e}}, {0x1ff, 0x9, {0x0, 0x2}}, {0x3, 0xed1, {0x0, 0x6}}, {0x401, 0x8, {0x0, 0x4}}, {0xfffa, 0xb1a3, {0x1, 0x3}}, {0x20, 0x2, {0x2}}, {0x200, 0xaa8, {0x3, 0xc9}}, {0x1, 0x9, {0x2, 0x5}}, {0xd9, 0x1, {0x2, 0x4b5}}, {0x3ff, 0x7ff, {0x0, 0x208ae735}}, {0x1000, 0x8000, {0x0, 0xb34}}, {0x9, 0x5, {0x0, 0x8001}}, {0x1, 0x1, {0x1, 0x200}}, {0x7f, 0x0, {0x3, 0x5}}, {0x3, 0x1, {0x3}}, {0x6, 0x5, {0x0, 0x2}}, {0x4, 0x1, {0x1, 0x6}}, {0x8, 0x0, {0x2, 0x40}}, {0x101, 0x3, {0x0, 0x2}}, {0x3, 0x3, {0x0, 0x1}}, {0x0, 0x8, {0x2, 0x3ff}}, {0x101, 0x0, {0x2, 0x101}}]}}}, {{0x254, 0x1, {{0x2, 0xfb}, 0x0, 0x0, 0xff80, 0xd42e, 0x17, 'syz0\x00', "215bbcfbbfdb7984153dc22d75448f2e8c10dee04eb8c8957c397c83d96043d0", "6733f762b7c5cc9c3c7f6978efad6ff3dde6abd47ade3a1c6f65caef7678054b", [{0x800, 0x2, {0x1, 0x7fff}}, {0x7ff, 0xfd, {0x2, 0x1f}}, {0x4, 0x401}, {0x733b, 0x101, {0x1, 0x9}}, {0x0, 0x8000, {0x2, 0x3}}, {0xaf, 0xc4, {0x1, 0x200}}, {0xff, 0x6, {0x1, 0x3}}, {0x8, 0x9, {0x0, 0x8001}}, {0x8, 0x6}, {0x1ff, 0x7f, {0x3, 0x3}}, {0x8, 0x9, {0x3, 0x1}}, {0x101, 0x80, {0x3, 0x5}}, {0x7, 0x7, {0x2, 0xc000}}, {0x0, 0x8000, {0x1, 0xd6}}, {0x5, 0x2040, {0x2, 0x200}}, {0x89, 0x1, {0x3, 0x3f}}, {0x1000, 0x7, {0x3, 0x9}}, {0x5, 0x5280, {0x2, 0x3}}, {0x9, 0xfffc, {0x0, 0x5}}, {0x8000, 0x8001, {0x2, 0x2}}, {0x8, 0x6, {0x0, 0x1}}, {0x9, 0x1ff, {0x3, 0x5}}, {0x7fff, 0x9, {0x0, 0x9}}, {0x3, 0x57, {0x1, 0x1}}, {0x100, 0x100}, {0xb8, 0x20, {0x1}}, {0x4, 0x81, {0x3, 0x1ff}}, {0x1, 0x7fff, {0x0, 0x800}}, {0x0, 0x4, {0x0, 0x9}}, {0xbb91, 0x20, {0x0, 0x40}}, {0x2, 0x1, {0x1}}, {0x18, 0x8, {0x0, 0x5}}, {0x200, 0x5, {0x0, 0x7fffffff}}, {0x3, 0xd39, {0x3, 0x7ff}}, {0x5, 0xe890, {0x0, 0x8}}, {0x1, 0x4, {0x1, 0x7fff}}, {0x1ff, 0xf2ff, {0x1, 0xf85a}}, {0x4, 0x5, {0x2, 0x800}}, {0x8001, 0x8, {0x0, 0x9}}, {0x7, 0x8, {0x0, 0xffffc835}}]}}}, {{0x254, 0x1, {{0x3, 0xffff90a9}, 0x0, 0x6, 0x8, 0x7, 0x1f, 'syz0\x00', "2f77a973cb30c9e7afce33e7283eea24ba91e177537b3ae7becda796ace2cfbf", "bea37f12cf6d0459ce09a2e754e776c7f4dfda1bc9045fd10c4afd20acd6c989", [{0x3ff, 0x0, {0x3, 0x1ff}}, {0x2, 0x3, {0x1, 0x5ea92b51}}, {0x8, 0x8000, {0x1, 0x7}}, {0x7, 0x8, {0x2, 0x8}}, {0x0, 0x6, {0x0, 0xd50}}, {0x8, 0x800, {0x1, 0x3}}, {0x401, 0x4, {0x1, 0x5}}, {0x458, 0x6, {0x2, 0x40728000}}, {0x87, 0x1f, {0x0, 0x2}}, {0x8001, 0x7ff, {0x3, 0x5746}}, {0x752d, 0x8000, {0x0, 0xfffffe00}}, {0x3, 0x3, {0x3, 0x1000}}, {0x4, 0x1000, {0x2, 0x7ff}}, {0x1, 0x3, {0x3, 0x3}}, {0x1ff, 0x3ff, {0x3, 0x9}}, {0x36, 0x1, {0x0, 0x8001}}, {0xd98b, 0x6, {0x0, 0x9}}, {0x58b2, 0x4, {0x3, 0xdb}}, {0x8000, 0x401, {0x0, 0x9}}, {0x2, 0x1, {0x2, 0x706c0ac2}}, {0x1000, 0x3, {0x1, 0xb0}}, {0x2, 0x1, {0x2, 0x1ff}}, {0x5, 0x100, {0x1, 0x4}}, {0xffff, 0x2, {0x0, 0x8001}}, {0x81, 0x8000, {0x0, 0x3}}, {0x2, 0x4, {0x7, 0x7fff}}, {0x2, 0x1f, {0x3, 0x200}}, {0x1ff, 0x2, {0x1, 0x8}}, {0x9, 0x1, {0x1, 0x8}}, {0x7f, 0x0, {0x1, 0xffffffff}}, {0x3f, 0x7, {0x3}}, {0x9, 0x2, {0x3, 0x8001}}, {0xf000, 0x6, {0x3, 0x8000}}, {0x1, 0x1, {0x3, 0x8}}, {0x3f, 0x9, {0x0, 0x299}}, {0x200, 0xb501, {0x3, 0xfffffffb}}, {0x3, 0x7, {0x3, 0xffffffff}}, {0x6, 0x8, {0x3, 0x1}}, {0x0, 0x81, {0x3, 0xffff}}, {0x8, 0x0, {0x0, 0x6}}]}}}, {{0x254, 0x1, {{0x2, 0x10001}, 0x3, 0x7f, 0x453b, 0x28, 0xc, 'syz0\x00', "25048973aeb651897c2bcd1a33ce2f7ecd9a360a435df47240d055dfaee774a8", "b3d5e69f3ab15a2bada155fa3d9b70a55e62037671a5c140f1fb5807ff8c51f5", [{0x40, 0x80, {0x3, 0x45d8}}, {0x9, 0x0, {0x2, 0xffffabb9}}, {0x20, 0x0, {0x3, 0x7f1}}, {0x7, 0x5, {0x0, 0x3}}, {0x0, 0x0, {0x0, 0x8}}, {0x400, 0xa641, {0x1, 0x4}}, {0x6, 0xc, {0x2}}, {0xff, 0xa, {0x1, 0xffffff7f}}, {0x8, 0x3d, {0x3, 0x6}}, {0x8428, 0x80, {0x1, 0x401}}, {0x8000, 0x0, {0x2, 0x193}}, {0x1, 0x5, {0x2, 0xffff}}, {0x9, 0x2, {0x0, 0x100}}, {0x2, 0x4, {0x0, 0x300}}, {0x200, 0xb96, {0x0, 0x9}}, {0x1, 0x40, {0x2, 0x6}}, {0x400, 0x4, {0x0, 0x7}}, {0x6, 0x1f, {0x2, 0xf3}}, {0x1000, 0x4, {0x3, 0x100}}, {0x20, 0x8, {0x1, 0x200}}, {0xfffb, 0x200, {0x1}}, {0x8, 0xc75c, {0x1, 0x1}}, {0x1000, 0x7ff, {0x3, 0x8}}, {0xff, 0x5, {0x3}}, {0x8a, 0x6, {0x3, 0xb473}}, {0x0, 0x101, {0x1, 0x1}}, {0x81, 0x1, {0x3, 0x81}}, {0x2c, 0x4, {0x2, 0x800}}, {0x8, 0x1f, {0x3, 0x3}}, {0x6, 0x200, {0x3, 0x5}}, {0x5, 0xb7, {0x0, 0x7}}, {0x2c56, 0x80, {0x0, 0xf7f8}}, {0xffff, 0xc000, {0x3, 0x10001}}, {0x6, 0x1, {0x2, 0x401}}, {0x9, 0x9, {0x0, 0x80000000}}, {0x9, 0xbc, {0x1, 0x3}}, {0x401, 0x0, {0x0, 0x7fffffff}}, {0x3ff, 0x38, {0x1, 0x6}}, {0x89, 0x200, {0x3, 0x3}}, {0x1000, 0x4, {0x3, 0xd8e8}}]}}}, {{0x254, 0x1, {{0x1, 0x9}, 0x1, 0x8, 0x7, 0x4e26, 0x5, 'syz1\x00', "21a4eb65f2cb1a6209a645d7f32767dad56ea6496cf6b7926a3ed24da618a955", "968a8c00aac79683e519ee7082fe562e0b58fd9975ad1a3daa5781f5b9159ce8", [{0x8000, 0x51, {0x1, 0x9a0b}}, {0x4, 0x8000, {0x2, 0x3ff}}, {0x80, 0xd73, {0x2, 0xd6}}, {0x4, 0x29d, {0x3, 0x5}}, {0x1, 0x3f, {0x1, 0x4}}, {0x593, 0x5, {0x0, 0xca1e}}, {0x0, 0xff, {0x0, 0x7f}}, {0x6, 0x1, {0x3, 0x8}}, {0x1ff, 0x7ff, {0x7, 0x8}}, {0x2, 0x7, {0x2, 0xb}}, {0x1, 0xfff7, {0x0, 0x6}}, {0x200, 0x0, {0x1, 0xfffffe01}}, {0x0, 0x5, {0x1, 0x499b668c}}, {0x6, 0x8, {0x0, 0x1}}, {0x3ff, 0xa65, {0x3, 0x8}}, {0x2, 0x1, {0x3, 0x401}}, {0x9d0, 0xaa, {0x3, 0xbf97}}, {0x3b, 0x8, {0x3, 0x1ff}}, {0x0, 0xfff, {0x1, 0x4}}, {0x6, 0x400, {0x2, 0x10001}}, {0x24c3, 0x7, {0x1, 0x20}}, {0x37ef, 0x5, {0x0, 0x4}}, {0x5, 0xc0, {0x2, 0xfffffffa}}, {0x1, 0xf001, {0x1, 0xefc3}}, {0x133, 0x2, {0x1, 0x80000000}}, {0xc007, 0x1000, {0x0, 0x7fff}}, {0x9, 0x3, {0x1, 0x8}}, {0x7257, 0x2, {0x3, 0x2}}, {0x7fff, 0xfff, {0x3, 0x4}}, {0x2, 0x81, {0x1, 0x9}}, {0xfc21, 0xff00, {0x3, 0x3f}}, {0xaa, 0x3ff, {0x2, 0x100}}, {0x6, 0xfffb, {0x1, 0x80000000}}, {0x9, 0x0, {0x0, 0x3}}, {0x85, 0x40, {0x3, 0x8}}, {0x1, 0xfff7, {0x1, 0x4}}, {0x100, 0x2, {0x3, 0x800}}, {0x637b, 0x20, {0x2, 0x1}}, {0x0, 0x6ad}, {0x8, 0x4, {0x0, 0xc8d}}]}}}]}, 0x12b4}, 0x1, 0x0, 0x0, 0x4040090}, 0x41) 19:08:32 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) 19:08:32 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="000400000000fedbdf2502000000240004800500030005000000050003000000000005000300070000000500030005000000240004800500030000000000050003000100000005000300060000000500030001000000200008801c000780080005000000000008000500ad5d80540800060000000000f4000c8014000b8008000a005f6d000008000900000000001c000b80080009008979c24a08000a002a6b000008000900088c85223c000b8008000a0000000000080009000000000008000a0088da000008000900d5dbfa2508000a002c5b00000800090093e89076080009002a80f83844000b800800090039946e7c08000a003ffb000008000a0063200000080009000000000008000a000000000008000a000e0f00000800090081be0f6408000a00e38100000c000b800800090067913e3434000b80080009009bf0e93c08000900c62370260800fc3e0800099473f05408000a003313000000000000000000000000000053f2cd40db9825f792d8783b5d7f85f1321ebe565b9d4ad0bcfb7644dd6f00ae6cb68231a0e6846a3b0849ac752dff022ed8f98e3989ef9fefabaa0d34b88efe37c34b068c01142e99d4bfad6a1700f6b51740392271c238747800993c06537ed096de7cda0c2b4ef90aae47ae8f801f1e117c9007418c2d6016efa85d77f68bb01b41e656d2e65eaf4521ba5a5ec8f43944bcbffdf97e37b3f968b7dfc4471738161630a73a9b934fa13462210337cff037b39561c754f8248d454197513ff2576521e1e1"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000400)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r11 = dup(r10) ioctl$SG_GET_ACCESS_COUNT(r11, 0x2289, &(0x7f0000000600)) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:32 executing program 1: getrusage(0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000140)={0x0, 0x0, {0x101, 0x80000000, 0x3017, 0x9, 0x7, 0x1, 0x0, 0x2}}) [ 1657.510400] hfs: unable to load codepage "cp8?" [ 1657.510411] hfs: unable to parse mount options [ 1657.523407] Unknown ioctl 4707 19:08:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x90) 19:08:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000400)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r10) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:32 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x90) [ 1657.984700] hfs: unable to change codepage [ 1657.984706] hfs: unable to parse mount options [ 1658.006050] Unknown ioctl 4707 [ 1658.029344] hfs: unable to load codepage "cp8?" [ 1658.029356] hfs: unable to parse mount options 19:08:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r2, &(0x7f0000000000)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)={0x2, 'ip6gre0\x00', {0x401}}) 19:08:32 executing program 3: socket$inet6(0xa, 0x6, 0x1) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1658.267164] Unknown ioctl 4707 [ 1658.268353] hfs: unable to load codepage "cp8?" [ 1658.279935] hfs: unable to parse mount options 19:08:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x90) 19:08:32 executing program 0: socket$inet6(0xa, 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000400)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r10) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:32 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c, 0xa8e9c515f6649431) syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x80, 0x10, 0x40, 0x1}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x3, 0x5, [0x9, 0x14db, 0x0, 0x8, 0x6b6]}, 0x12) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x680000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r4, 0x4010ae94, &(0x7f0000000040)={0x9, 0x0, 0x7}) [ 1658.380323] hfs: unable to change codepage [ 1658.380328] hfs: unable to parse mount options 19:08:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) [ 1658.537546] hfs: unable to change codepage [ 1658.542359] hfs: unable to parse mount options [ 1658.566421] hfs: unable to load codepage "cp8?" [ 1658.572169] hfs: unable to parse mount options [ 1658.583731] Unknown ioctl 4707 19:08:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendfile(r3, r4, 0x0, 0x1) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$SIOCX25CALLACCPTAPPRV(r5, 0x89e8) mq_notify(r2, &(0x7f0000000000)) 19:08:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:33 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000005c0)={0x1, 0x0, [0x0]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x5, 0x7fff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000080)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x9, 0x9, 0x3d7, 0x3, 0x0, 0x1f81c76a, 0x5}, 0x9c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) 19:08:33 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000400)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6060}, 0x90) [ 1658.745822] hfs: unable to change codepage [ 1658.745828] hfs: unable to parse mount options [ 1658.822318] hfs: unable to load codepage "cp8?" 19:08:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) [ 1658.822331] hfs: unable to parse mount options [ 1658.902459] Unknown ioctl 4707 19:08:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @local}}, 0x7e7, 0x2, 0x9, 0x80000001, 0x12, 0x1, 0x1f}, &(0x7f00000001c0)=0x9c) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4, 0x8, 0x9, 0x0, 0x0, 0xc13, 0x10400, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x4, @perf_config_ext={0x3, 0x5}, 0x6000, 0x4, 0x4, 0x4, 0x40, 0x3e, 0x6aef}, 0xffffffffffffffff, 0x4, r1, 0x8) 19:08:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6060}, 0x90) 19:08:33 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000400)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:33 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semctl$IPC_RMID(r0, 0xff7f0000, 0x10) semctl$GETVAL(r0, 0x3, 0xc, &(0x7f0000000000)=""/123) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000080)={r8}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={r8, 0x8001}, &(0x7f00000000c0)=0x8) ioctl$SNDRV_PCM_IOCTL_FORWARD(r3, 0x40084149, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000100)={r9, 0x6}, &(0x7f0000000140)=0x8) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) 19:08:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) [ 1658.968057] Unknown ioctl 35304 [ 1658.969637] hfs: unable to load codepage "cp8?" [ 1658.969647] hfs: unable to parse mount options [ 1659.019929] Unknown ioctl 35304 19:08:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x9}, 0x0) mq_notify(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, @tid=r3}) 19:08:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6060}, 0x90) 19:08:33 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="000400000000fedbdf2502000000240004800500030005000000050003000000000005000300070000000500030005000000240004800500030000000000050003000100000005000300060000000500030001000000200008801c000780080005000000000008000500ad5d80540800060000000000f4000c8014000b8008000a005f6d000008000900000000001c000b80080009008979c24a08000a002a6b000008000900088c85223c000b8008000a0000000000080009000000000008000a0088da000008000900d5dbfa2508000a002c5b00000800090093e89076080009002a80f83844000b800800090039946e7c08000a003ffb000008000a0063200000080009000000000008000a000000000008000a000e0f00000800090081be0f6408000a00e38100000c000b800800090067913e3434000b80080009009bf0e93c08000900c62370260800fc3e0800099473f05408000a003313000000000000000000000000000053f2cd40db9825f792d8783b5d7f85f1321ebe565b9d4ad0bcfb7644dd6f00ae6cb68231a0e6846a3b0849ac752dff022ed8f98e3989ef9fefabaa0d34b88efe37c34b068c01142e99d4bfad6a1700f6b51740392271c238747800993c06537ed096de7cda0c2b4ef90aae47ae8f801f1e117c9007418c2d6016efa85d77f68bb01b41e656d2e65eaf4521ba5a5ec8f43944bcbffdf97e37b3f968b7dfc4471738161630a73a9b934fa13462210337cff037b39561c754f8248d454197513ff2576521e1e1"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$BLKRAGET(r9, 0x1263, &(0x7f0000000400)) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) [ 1659.109772] Unknown ioctl 1074282825 19:08:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x6060}, 0x90) [ 1659.134323] Unknown ioctl 4707 [ 1659.148300] hfs: unable to parse mount options 19:08:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x2) r1 = dup(r0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@codepage={'codepage', 0x3d, 'cp857'}}, {@codepage={'codepage', 0x3d, 'cp737'}}]}) [ 1659.176272] hfs: unable to load codepage "cp8?" [ 1659.176284] hfs: unable to parse mount options [ 1659.226604] Unknown ioctl 1074282825 [ 1659.242549] hfs: unable to parse mount options 19:08:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x6060}, 0x90) 19:08:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x428800, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000080)="6e4f062ce633362df87d8ab0d866f5640991e553d5dfa2b1b395533c348ac113850344b462fa94cefc4b3e1d5c18a0ac026d0178c4d6aef5bb15a368b228fa05b193422d2bff06aec3cb8fc0ea2426e85470f886dcfc135938637a4a3cb122f16eb8d700c5f2366d7a82baffa0857943eb029ab853b245f9ae7a68f185ef79012a84f6a925a9508e55936d2ff46250c6fedd8d4614581baf1947fed553b6464b187cf615a96b02b67a548b588c76547aafa88666e6a8ad61b7850ce435440bf5bfd0d87562a027325c", 0xc9) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 1659.374695] hfs: unable to load codepage "cp8?" [ 1659.379502] hfs: unable to parse mount options [ 1659.411131] Unknown ioctl 4707 19:08:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:33 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r9, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) [ 1659.444623] hfs: unable to change codepage [ 1659.448912] hfs: unable to parse mount options 19:08:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x6060}, 0x90) 19:08:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r1 = dup(r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000600)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r2) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x4, 0x9, 0x4, 0x800, 0x7, {}, {0x3, 0xc, 0x80, 0x3, 0x0, 0x7, "c5fd4453"}, 0x1, 0x2, @fd=r1, 0x7, 0x0, r2}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={{0x0, 0x0, @reserved="d43117df454455261d82e17849904699802546b59002b35092a58d1105f80dbb"}}) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001680)=ANY=[@ANYBLOB="38c476dfdb10e50d0000000000076900004713b28d898d0436bafcae6f3360978a2a524853dabf8dcaeb79f4c2929c3119d758c692b0affe0e74d6d5aff85576466fc4753ebe01a306e09add7b48606b8872c6b1b856b604bb638b12a2c48bcb9e15fca5a866", @ANYRES32=r5, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r6 = creat(&(0x7f00000002c0)='./file0\x00', 0x4) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000001740)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r6, &(0x7f0000001800)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x24, r7, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040081}, 0x20000800) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)={0x1280, 0x13, 0x0, 0x70bd27, 0x25dfdbfd, {0x10, 0xff, 0xc6, 0x5, {0x4e23, 0x4e22, [0x4, 0x0, 0xd68, 0xfffffffb], [0x4, 0x9, 0xfffffff9, 0x5f], r5, [0xc07, 0x7]}, 0x4, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xc7, 0x1, "895ad97fb05ecc744da8874d4740ea9d4158a5675ab56990bc4c4ad653138ad8a3a78e18d5fb89610c575d60722c1c4935a58fb657c56767acaf1e74e06cc850998d4aa6a645fcbbcdb0f2190e32ad606c9606b0d7d76501d9c2baf0beda68af42abfe0e933888eeea683ae9c1cd656cd002597221a9ef85a2c0b911ef267fc693b645f886f7ef9660531f8818b950f3086860b317c8e18a7be49b309b88400d66a168ae702279a4b11e3408a987b85d81b882b2d7bf80919eff2ef51f310aa4dc0e49"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xba, 0x1, "b39f026c9b0beb398649a9de031a5878a22ae96325aff865581edb2f7d056593c81ff87c41d9b169e427408ef8bbcb10af011360eaedfc8799dc034febac73e210180fca936064ecb7c64041f8b5da8ff10ecb0bda74799b378c9ef78978409f45e5f29a78e92e24183723d8586e201eeb93532d64eec13d5fc9567171ccd284fcaf036f4c7daed4c3090c5415a9607428437d59067a9c8ae56b86ad15bbe7605e363cd364d9da6df30a5110f305b0c7ba16feb23223"}, @INET_DIAG_REQ_BYTECODE={0xa9, 0x1, "662c3a97bcf4f3c44fd34291e3817d1797438c3cae7e6de46f021da9a712a7d3abebbb577be1b56312d057694807b5a46c1072611d8c16277c6652386468c2bde9168c207c2744e8ead28ee8d2cc4bf1106e8488edceab1094cf82c8c40df0c7632ec976a781eab8e4a319895fe82a70011ad0de7d70e645f41ae217353a2457dda1158aef3fd00b3def46e7b455187d3e767c4f4902c19d10cb1eeca6c4c2d45b55f7f0df"}]}, 0x1280}, 0x1, 0x0, 0x0, 0x10}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r8, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 1659.628330] hfs: unable to change codepage [ 1659.645551] hfs: unable to load codepage "cp8?" [ 1659.659139] hfs: unable to parse mount options [ 1659.666406] hfs: unable to parse mount options 19:08:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x20440) sendto$llc(0xffffffffffffffff, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x40003ad, 0x2000000) getsockname$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f0000000100)=""/65, &(0x7f0000000180)=0x41) mq_notify(r2, &(0x7f0000000000)) 19:08:34 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x7b9, &(0x7f0000000040)) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:34 executing program 3: ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp85\x00\x00\x00\x00\x00\x00\x00']) 19:08:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x0, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) 19:08:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x0, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) [ 1659.899775] hfs: unable to load codepage "cp85" [ 1659.906244] hfs: unable to parse mount options [ 1659.912110] hfs: unable to load codepage "cp8?" [ 1659.916815] hfs: unable to parse mount options 19:08:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:34 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x0, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) [ 1660.053492] hfs: unable to load codepage "cp85" [ 1660.053504] hfs: unable to parse mount options 19:08:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fb0\x00', 0x588d03, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, {0x2, 0xfffffffc}, {0x20000}, {0x0, 0x0, 0x2000}, {}, 0x0, 0x80, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x7fff, 0x0, 0xfffffffc, 0xff, 0x0, 0x2, 0x0, 0x7da175789009e9e9}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x490400, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_ATOMIC(r3, 0xc03864bc, &(0x7f00000002c0)={0x401, 0x4, &(0x7f0000000100)=[0x9, 0x1eda, 0x8e, 0x5], &(0x7f0000000140)=[0x5, 0x1ff, 0xff, 0x4, 0x9f, 0x0, 0xc053], &(0x7f00000001c0)=[0x3, 0x4, 0x3b7, 0xfffffff9], &(0x7f0000000280)=[0x8, 0x0, 0x2, 0x2, 0xffffffdc, 0x842c, 0x6, 0x5e, 0xfffffff9, 0x310], 0x0, 0x2}) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x9) ioctl$SNDRV_PCM_IOCTL_DROP(r3, 0x4143, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r5, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r5, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r5, &(0x7f0000001380), 0x40003ad, 0x2000000) r6 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000480)='/dev/audio1\x00', 0x10400, 0x0) read$dsp(r6, &(0x7f0000000bc0)=""/25, 0x19) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x200000a, 0x13, r5, 0x24804000) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nvram\x00', 0x8000, 0x0) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r8, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) ioctl$VIDIOC_QBUF(r8, 0xc058560f, &(0x7f00000009c0)={0x6, 0xc, 0x4, 0x70000, 0x1, {0x0, 0x7530}, {0x7, 0xc, 0x82, 0x80, 0x0, 0x6, "6f766990"}, 0xf1, 0x2, @planes=&(0x7f0000000680)={0x9, 0x7f, @userptr=0x39e5, 0xdfd9}, 0x1d3, 0x0, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_INFO(r9, 0x0, 0x60, &(0x7f0000000a40)={'filter\x00'}, &(0x7f0000000ac0)=0x44) sendmsg$NFT_MSG_GETFLOWTABLE(r7, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f00000005c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="f0000000170a0500000000000000000000000004c40003800800014000000000b800038014000100626f6e645f736c6176655f3100000000140001006970766c616e31000000000000000000140001000000000000000000000000000000000014000100627269646765300000000000000000001400010000000000000000000000000000000000140001006c6f0000000000000000000000000000140001007465616d5f736c6136655f31000000007ab3ebf486195fb2c79cbba37394140001006970366772653000000000000000000014000100626f6e0000000000000900020073797a31000000000000000000"], 0xf0}, 0x1, 0x0, 0x0, 0x40008c0}, 0x436b12dc7aa980e5) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="00032bbd7000ffdbdf251300000006001401371300000c0043000200000000100000050029000c000000139f644131a4665e72e62785bcf7ba2a6fb11041d40bbfa5942fa4e44f49fd6d8931c52f2fcf71db9368c991598e7e53a2a47854887a2042c4ead602e9f670a8063604c90f269c0bdea6f44331065584628ad63776fb11f315c597eaff67f5410ed82ba6e81fd7991bb09af7b15ed94ad72ef92396e252b57ad9a7931c35042cf4504689bbf9858135"], 0x30}, 0x1, 0x0, 0x0, 0x8008}, 0x100) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x9) 19:08:34 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020400) r2 = mq_open(&(0x7f0000000040)='.selinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) mq_notify(r2, &(0x7f0000000000)={0x0, 0x1, 0x0, @tid=r3}) 19:08:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) 19:08:34 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) [ 1660.472311] Unknown ioctl -1067952625 19:08:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x6060}, 0x90) [ 1660.509904] Unknown ioctl -1067952625 19:08:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) 19:08:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x5}, 0x14}, 0x1, 0x0, 0x0, 0x6060}, 0x90) 19:08:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r1 = dup(r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000600)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r2) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x4, 0x9, 0x4, 0x800, 0x7, {}, {0x3, 0xc, 0x80, 0x3, 0x0, 0x7, "c5fd4453"}, 0x1, 0x2, @fd=r1, 0x7, 0x0, r2}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={{0x0, 0x0, @reserved="d43117df454455261d82e17849904699802546b59002b35092a58d1105f80dbb"}}) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001680)=ANY=[@ANYBLOB="38c476dfdb10e50d0000000000076900004713b28d898d0436bafcae6f3360978a2a524853dabf8dcaeb79f4c2929c3119d758c692b0affe0e74d6d5aff85576466fc4753ebe01a306e09add7b48606b8872c6b1b856b604bb638b12a2c48bcb9e15fca5a866", @ANYRES32=r5, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r6 = creat(&(0x7f00000002c0)='./file0\x00', 0x4) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000001740)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r6, &(0x7f0000001800)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x24, r7, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040081}, 0x20000800) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)={0x1280, 0x13, 0x0, 0x70bd27, 0x25dfdbfd, {0x10, 0xff, 0xc6, 0x5, {0x4e23, 0x4e22, [0x4, 0x0, 0xd68, 0xfffffffb], [0x4, 0x9, 0xfffffff9, 0x5f], r5, [0xc07, 0x7]}, 0x4, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xc7, 0x1, "895ad97fb05ecc744da8874d4740ea9d4158a5675ab56990bc4c4ad653138ad8a3a78e18d5fb89610c575d60722c1c4935a58fb657c56767acaf1e74e06cc850998d4aa6a645fcbbcdb0f2190e32ad606c9606b0d7d76501d9c2baf0beda68af42abfe0e933888eeea683ae9c1cd656cd002597221a9ef85a2c0b911ef267fc693b645f886f7ef9660531f8818b950f3086860b317c8e18a7be49b309b88400d66a168ae702279a4b11e3408a987b85d81b882b2d7bf80919eff2ef51f310aa4dc0e49"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xba, 0x1, "b39f026c9b0beb398649a9de031a5878a22ae96325aff865581edb2f7d056593c81ff87c41d9b169e427408ef8bbcb10af011360eaedfc8799dc034febac73e210180fca936064ecb7c64041f8b5da8ff10ecb0bda74799b378c9ef78978409f45e5f29a78e92e24183723d8586e201eeb93532d64eec13d5fc9567171ccd284fcaf036f4c7daed4c3090c5415a9607428437d59067a9c8ae56b86ad15bbe7605e363cd364d9da6df30a5110f305b0c7ba16feb23223"}, @INET_DIAG_REQ_BYTECODE={0xa9, 0x1, "662c3a97bcf4f3c44fd34291e3817d1797438c3cae7e6de46f021da9a712a7d3abebbb577be1b56312d057694807b5a46c1072611d8c16277c6652386468c2bde9168c207c2744e8ead28ee8d2cc4bf1106e8488edceab1094cf82c8c40df0c7632ec976a781eab8e4a319895fe82a70011ad0de7d70e645f41ae217353a2457dda1158aef3fd00b3def46e7b455187d3e767c4f4902c19d10cb1eeca6c4c2d45b55f7f0df"}]}, 0x1280}, 0x1, 0x0, 0x0, 0x10}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r8, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x5}, 0x14}}, 0x90) 19:08:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0x0, 0x0, 0x2}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r2 = dup(r1) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000600)) getsockopt$inet_tcp_int(r2, 0x6, 0x16, &(0x7f0000000140), &(0x7f00000001c0)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') connect$pptp(r2, &(0x7f0000000040)={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0x2c}}}, 0x1e) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000000)) 19:08:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00\x00\x00\x00\x00agu=cp737,\x00']) 19:08:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x5}, 0x14}}, 0x0) 19:08:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r3, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r5 = dup(r4) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000600)) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r6, 0x40086425, &(0x7f0000000140)={r7, 0x2}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r7, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008080}, 0x4010) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:08:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) 19:08:35 executing program 5: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x400480, 0x0) recvfrom$phonet(r0, &(0x7f0000000040)=""/30, 0x1e, 0x1, &(0x7f0000000080)={0x23, 0x5, 0x7, 0x9}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) linkat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x0) set_tid_address(&(0x7f00000000c0)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, 0x3, {0xf7}}, 0x18) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x101002, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000240)={'icmp6\x00'}, &(0x7f0000000280)=0x1e) 19:08:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="000400000000fedbdf2502000000240004800500030005000000050003000000000005000300070000000500030005000000240004800500030000000000050003000100000005000300060000000500030001000000200008801c000780080005000000000008000500ad5d80540800060000000000f4000c8014000b8008000a005f6d000008000900000000001c000b80080009008979c24a08000a002a6b000008000900088c85223c000b8008000a0000000000080009000000000008000a0088da000008000900d5dbfa2508000a002c5b00000800090093e89076080009002a80f83844000b800800090039946e7c08000a003ffb000008000a0063200000080009000000000008000a000000000008000a000e0f00000800090081be0f6408000a00e38100000c000b800800090067913e3434000b80080009009bf0e93c08000900c62370260800fc3e0800099473f05408000a003313000000000000000000000000000053f2cd40db9825f792d8783b5d7f85f1321ebe565b9d4ad0bcfb7644dd6f00ae6cb68231a0e6846a3b0849ac752dff022ed8f98e3989ef9fefabaa0d34b88efe37c34b068c01142e99d4bfad6a1700f6b51740392271c238747800993c06537ed096de7cda0c2b4ef90aae47ae8f801f1e117c9007418c2d6016efa85d77f68bb01b41e656d2e65eaf4521ba5a5ec8f43944bcbffdf97e37b3f968b7dfc4471738161630a73a9b934fa13462210337cff037b39561c754f8248d454197513ff2576521e1e1"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r5, 0x40086425, &(0x7f0000000140)={r6, 0x2}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f00000003c0)={r6, 0x7, &(0x7f00000002c0)=[0x0, 0x323aff13, 0x71e2, 0x5, 0xfc, 0x3, 0x1ff], &(0x7f0000000300)=[0xffff8000, 0x2, 0x1, 0x5, 0x2, 0x404, 0xffff118e], 0x1, 0x1, 0x1f, &(0x7f0000000340)=[0x6], &(0x7f0000000380)=[0x7fffffff, 0x2]}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1661.192588] hfs: can't find a HFS filesystem on dev loop0 [ 1661.304382] hfs: can't find a HFS filesystem on dev loop0 19:08:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r1 = dup(r0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000600)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r2) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000000c0)={0x4, 0x9, 0x4, 0x800, 0x7, {}, {0x3, 0xc, 0x80, 0x3, 0x0, 0x7, "c5fd4453"}, 0x1, 0x2, @fd=r1, 0x7, 0x0, r2}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={{0x0, 0x0, @reserved="d43117df454455261d82e17849904699802546b59002b35092a58d1105f80dbb"}}) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x72) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001680)=ANY=[@ANYBLOB="38c476dfdb10e50d0000000000076900004713b28d898d0436bafcae6f3360978a2a524853dabf8dcaeb79f4c2929c3119d758c692b0affe0e74d6d5aff85576466fc4753ebe01a306e09add7b48606b8872c6b1b856b604bb638b12a2c48bcb9e15fca5a866", @ANYRES32=r5, @ANYBLOB="00000000ffffffff100000000800010068686600050005"], 0x3}}, 0x0) r6 = creat(&(0x7f00000002c0)='./file0\x00', 0x4) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000001740)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r6, &(0x7f0000001800)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x24, r7, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040081}, 0x20000800) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)={0x1280, 0x13, 0x0, 0x70bd27, 0x25dfdbfd, {0x10, 0xff, 0xc6, 0x5, {0x4e23, 0x4e22, [0x4, 0x0, 0xd68, 0xfffffffb], [0x4, 0x9, 0xfffffff9, 0x5f], r5, [0xc07, 0x7]}, 0x4, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xc7, 0x1, "895ad97fb05ecc744da8874d4740ea9d4158a5675ab56990bc4c4ad653138ad8a3a78e18d5fb89610c575d60722c1c4935a58fb657c56767acaf1e74e06cc850998d4aa6a645fcbbcdb0f2190e32ad606c9606b0d7d76501d9c2baf0beda68af42abfe0e933888eeea683ae9c1cd656cd002597221a9ef85a2c0b911ef267fc693b645f886f7ef9660531f8818b950f3086860b317c8e18a7be49b309b88400d66a168ae702279a4b11e3408a987b85d81b882b2d7bf80919eff2ef51f310aa4dc0e49"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "5a37abecbe5fc634c3f8fae956b6a68c54b929ca2ea69d6304116e961bc7939497dddaf860458a55fd3bf99d6237443e92228d19f4998815aac92a53ac39f9df6cbe227d2c61b86321f9f03d5ead480622f701d3c7c7e9b01dee2310f0ea4ee4b8ae2a91e9ec0652ee53cbbfe876bed54845a7a37959faecc8b44768daf4241e4562cef2451578643e3a4170c822f897bf8d1686e84884de715ea47008f36ff6cc2b6ce77a2c549db1be96998d925838d723759de1e3a92eb44ea3df6d305165ab8de5f61e6eaf7068f3001d16ff6d840506087820f000f3f2a7275de7a1a1f094d7646f1c4ab997dd2326fd2632b20c359d15530c177c290dada2f256c395ae8cd93ad48460939bcd5a0b59047aad526fd357a0fcbf1eb4ad278e418e4ea4c62a3ba260d953b44d824e75deba524a586d7ab47c383bd47ca2aebcfe1d8839eabd219cea2eb014be86440a66c2a24c996c3bb56f104e072a1971a29cec270c5d3c2fdc46574e5120af47ba6b539a08fdf10086b9684a2aa31cc0e0a44422d39ed3bb26a62bf85503b35d0cad6971ae934f7636bf9d099ed33ebeeb9f3d3c70a01f0cd556708689dc83d9b85ada98b0bc40a37e807153cffc2bc9939223ef9eaf953895a2b92b184fbd6aa66846d5dc00831f6d51bf6e073cbb0e9a451ad1cc1e761f143a26805c97faa27fffc2e97a63ab85953ed8cc8c6596ebb75e85141d1a471e5ee2b978e87e837fce4ce2dc6556679ec860534af34ae0c6e002499bdb0172f8ec11f1f0c78714613f562218ca88615bd62ba1e6ba55b530bf98585e04688c76243b3595bc8cfe55867b7eae273918b241cdf4d38c22081ad3909adebfa7d1182874ced783cb23135af85393b3601665f90bedf5b255311eded632e62f9fdbcbf9e6fef3a027de165d42db886065c160d41a3fb30dffccdeb0b8e663501a5172f36320556cc0cc2efb494d8543929721e09c1e5a36a7cba6e9a844287d686b6b35686d78a5bd4ff7897c08e1c5e7f53cdb0ffcb317e10304d2815c6bf322635112b36738d34677fc7f626712698cab8da6fd83ab5ecef59e1387f332df478f186c106b2d693d232d8544f0dd4cf43ebcbc40c562a69ccd265e3c7c334111e34d94e7cf02ba5b3de1e4f602b61fe0077b710c01f1e4ba2e3cbe27f7c3095f5fc6cbf3755a7e9779dc2ee5ca0a6b3a05a2c93053b2bfc939a148dd3e145db4125287c52e886e5a7d1474d80a47312e7a28b92533ed8b30f3b154e847f759de9cb9c6d25fa24235a3a7fc98287c3e9d1a8f483121d26f43d59a147bcb15721d875d4a03cb54729344d744735b33fdbc5507e204b1288085316fcbe8705ae27fc1746837eb6f7ae6ef86113c434d256e69f1259db3971bc27e309bcd9edc8098a21be3060851b7cb3e10b13cf20bfe43989a11afbc060b1104629bbc9fd7b2899880e416830c88e2a7adf9ed20a3ee20eb0d98dd633a299507b7bfa8338f8ce12cd35f756bdeb26406748ea5125934c530509e5456d73f756ad726fec8cfd596001cb6978d5d88de5dad3c80107227b4e4f505a4bf02bf1583303ab4f9e725b258648482a93b31424907ed2ab9a46ac552dbb3da0f21d24f205d17bd73e548a326663aaa15fb74a09132077701117fbb3973e567b919f7f865633f54f72de5cb133ecb7ec6de5f6d985c15932af34e8bd0c82b3fd658777aae1867de521adaced57e7cb1dc34f4a3988c671e7b24bbf9e4ba7f552c9dc5ac04cd5c442373ec013a62d8249153bef9d8db727756fe4241f9773622ba165083aaefc9989f422550b68cfd320528c6d84000abe941e26a4aaa781d0271bab4538990563d159e0c598c2076065609f8798d9133c789f976821e07e35b2983bfb568d9f5eb10067c98174304058c291db672e93a8e11315b8123a61a3942ec2c7e7d70352fb3f0b9b6cd510570d1293fe34208752b9145dc636e15a54ae550d7fe68a744695efbb54d12e7c282ddca7d10310453197493c6501f98733b9bfab5a3dd4f59ff3b0a70df8104665bc237b171d494480a5f6267eb6ddd6f1e3085a7980ee13954a787a760de578d59c745b2f48f22f07226834955f78ea3af9e6865e755ed75ae16d50257b3aa8ddef76fd26954006685c1621007908394faf700969493ed573e8dc91cc99f447a01762caa945bef6324cb9cfe7b589891ae5b86adf8470be81c4324622bbe12b00872eca0a3d99bcd998a3b0c764bb1be299d71cb76aa295fd1a40a91199d010eebace04ffec51915e7f60f4a153228f3c00c983b22180ea6da66c4bbf40207bd9e46cbced32b765d56d2a210a5c4662f68abfbbe479a01b1a8ba1e270837ce8b112897b4de72f64d56c393c0e69eb03c18591c40e8e857021ce9492ac76dd52f009924d8125019d0697263be55d487a8265d814c35a10e4841f18414c050f260185a61c8f1a0fc0bf3f8114cfa3b92329c7a9a95d251a6df64586f2770bc3138b9ab1308f6195d6476c095903bca981246f8ef6738cc93545eb2a72d24455b015ad8566e2ff1a9808131db54ed91ca835059eea758acc2ceb63fa66bd4f9d44a6de34f2a4684af2a6440ff1e47e63d68dda63798a57036e0f00c773c46d923d64f7c5c6aa4521da1b5d0e64c8a90d424c801fd64f9ed8eb2b5291b5f00a2305bf9e9d2717b23c4f7e7bdd00e656d1f0a2e59fa1e586481b472f4dffb9dc53a6c8571a3754cd8cdc93aa131a145101a29b495e84d1cb868e25e5d3f2bd729a2b6c84177d2b2d223e6144e44ca4d6d870e72ecc5a255828648835a2c198ba6d9f77a4f9d658f3e1639da87cde883d5f53c456831603099e4656aeeae5f5ee2fe140f66f8abc6d7a5c053f81ec046082f6dd4b360b6e546735ca0803075124030f3d47eaa603bcc149db3c11a929b01b57a31e080ee7d102afe2808d93c33451e234b950ce2377a9d35f43988fc62629d84e8d548367f33fa5d40394256d2f1731c5f4c79a0eca5d7bba1521d7ecdca6d1dcd4f13f1fe92a95b2e7eedafebce0ad69bf5ab91bfe851b37d512896b89933deb67f97cbb8870be03b0c1ffccc781d287c1afa9df8f3311b3fae0155474f846309f63d1a1f75389f6d45334b3e471e05d695e4e61236ce4fd86da7545e001d63c3617d9aebc078fd4cd80938cc552a26553dbb99ceccdfdc1b256bd1def1d542a2760ee4ff90efbff4f9aed61f52600665dd1c10d327e63b29fdae94fd0f1e166e2ca7e0941dd9c1a99c22e52d1b372f07f88c7207ff17ddcf033f854a99e9565156cadf024915568f38d6dae28d61ced493a8718e791c1df73955d478c577bb9ee62ade33dd59018d6460f8b8949a562ffbde3f50dc98701ed6c97e216b04ba154fb3b26c80fa356e488041c428cbc8f623be43e2a8122a8d09d3da40b5525b30899c033e82b707f224bdfc8f8ce3a1c205a9dd5068b26f213b2b66e20ae0fbcfb4b39f0e2ed32227b7ea482e6a25d3e06560e26c3d16ed705491bedb136ce707d4faded4a1e88378f3cda7f68e5b164d95d2f9bdafb85fba1ce66ea5ec60587f4f5c13fd4f8152d1fa210896195d5ab446eb5abdcd5a2a61269af4e6397c159b4d2a39c83b094598682986bea0c6e758e6ff59b2b704ee0fee667053b52aaa1ccd9ae2f58d479a37fb1dcb2c239164a6eebb591d1983efdd5d2059b0d7caa73606f3d90a73df860ca599b4b776da87229692f1b5d99eadf9ac24a700e7016e0a8fb1c486c33938f14e4cdcbf525fd838c0b0ee7e811eaef688da1b437aa3fda976113b530da63b336746061f5fd99ef13c6bd47edbb7ab417a201f5e2c10cc770b3c29104ac6f2a96491fd58562740474854a045e5ea75754536b7129c88f223f4575f741598456c5d037c8de6e907dcb265bac7255466d5a18a85412a6d1295e4618b81c990f46cda19b3e7c314dd7379ec55072e6bc001d25068571a7d6750f2600bd0f56cc86f9571d93b053f52ab80343d6f978ae1b33fbd8887db048948d580ea1a2ab550c6192733c67ddc7fe8d86668aed56a63c0a2ccfcbc016634dab4d3baea0dd978e88c3340ac11de2f855317c700f1af0883ba3a97c3d58c48b3c977260f8f9b484a1b9252c2381709679602b8c39da0083c30d49675a8a8b02f029fb23893d7ade7cc63bda8a548779052e7a0b4702b9d75883cbecc971b78841c1b9fb2d8dd4510a173d9b4f98340c7564b8c06a9bbe4c972e2b2695c103c8ffbfac0203f1a58bdf586fae0dd647e15e13739078740264f40374432df42199179b6a43c7e2d478a929e1a1224cc30173fc1b1f33339b12f9840fbbdc8bee4912619fb84db509378ec1a7fd37cee5ecdb1d4cd48e7e3dc1c00534deca7ec4626a55f08df571a03d580e7b316e3f1511f1acf3e99d38a706dac87cc1f26d65bcf44eb63b830273b5ee2aa63151a5b1b7ac50f908745373a9e8280197a28277a7daf8ce0020a364870ad41f9378abce52eb22329de137dab36b18be508ede334d60278f7460b38d70459fb00ba070c4f9eea5cbdccbc83b50b07261494734c7f7e842bf21494f637430e3cf334a61e3d0f170dd0795085d6f1354974c0b5688dcf791ad14f40e2ac33154fa104c83549fc40ea79413fed11e19811ca7583da0df4271d8b47adc2738e954757a30c7e3355fc4d3480f42a6ec2abb2fd4722f1443c5368d2fcb926e215c1969852e408062de5c65ee06e50c5d8aea32c1b5c6e1152241049e3e12c503a1f7de034d5afc8f98c5f272e34bdf0a5600628de84f5873580a650072ac8f74a865f6f90340349d5bc99f39223f1280eaf4b027e9282ab0ddbd1e086f40da6cf105bbc1eb97bd2fab1edfb778dece9872d35c8d43c1405bbaf9c3e53946343c45de45163e46dcb0c3c6b27cdb06ff97ad055b802203be60471a547caa5346b413e48d22573a2d1d2954b2ce4c39c7af27da500c9c1efd107863e1c601499cff284880badd8becf24d232de6fef491edd07abc44aad78644c9cf2230d19edd5dd4455ba6fbdfb6a5fdcc7d2fb724a37fcca5313eebe84034f709cff0d5d393b10368466f6ca62b89a87df6f7bb79ef055f874fff56321980228a6e79dfbc70ebb5fa9840a7fdb84f3895e17d023087b917163afc076ee4041af319ca65b7b4883437a194dabb50dc7f7329a8341dbf88f8a821d374f189470eeb71dcee3b66914282e1f7e6cf04f5ce2a819c76ad12aa7235e47640b00a1785abacd539291c16a6fe14cabc68e34208aed3612dd04d1f04c2a04783a403d0ff8a02357f4eccddb24346bd35d3cb5ac14022c8c01e0d3eec258c2fa4ded20815f754e361a0b0d273376dd8b86a61e842aaf1d2fdebfcf817e6990f9900c95d29dca79eaa7c74d78d80866cc56fd174ea85abedf90cef8dc0459ea2dbc3c79ef8acfdc66f2a98e4538bd88ba0cfc931a5c41165093332b7059aa451c5f583232b5592faf5e64d105a49979c72aac1ed8eca1e8268b0ca8a6cc291e08e48ccfab1015a5c493979611d8c907bb3ea9443d8fe4b191d0c93ef43540c13b3eeff16030c92e53aa23f1b92523d4014056467a364d978c1fa98f17b855497bed7e43746d2b8bfbf4bb0b4a2403921d14d3f92ed781e801108236217197c0d1a04ec3b5c6daf560dad44e5750bbbb387b8316f9a9eb3247491dfb7c2726b2fd550949917df4892199a8afe4497f767c761fe8d26f5aecdb2204933b5dfb4b199f8b61cd216903b19222832d65cfcd75675c18d13dc5972a59a1411ecd910a86073d0189f3ef256414fc103625d77f5e"}, @INET_DIAG_REQ_BYTECODE={0xba, 0x1, "b39f026c9b0beb398649a9de031a5878a22ae96325aff865581edb2f7d056593c81ff87c41d9b169e427408ef8bbcb10af011360eaedfc8799dc034febac73e210180fca936064ecb7c64041f8b5da8ff10ecb0bda74799b378c9ef78978409f45e5f29a78e92e24183723d8586e201eeb93532d64eec13d5fc9567171ccd284fcaf036f4c7daed4c3090c5415a9607428437d59067a9c8ae56b86ad15bbe7605e363cd364d9da6df30a5110f305b0c7ba16feb23223"}, @INET_DIAG_REQ_BYTECODE={0xa9, 0x1, "662c3a97bcf4f3c44fd34291e3817d1797438c3cae7e6de46f021da9a712a7d3abebbb577be1b56312d057694807b5a46c1072611d8c16277c6652386468c2bde9168c207c2744e8ead28ee8d2cc4bf1106e8488edceab1094cf82c8c40df0c7632ec976a781eab8e4a319895fe82a70011ad0de7d70e645f41ae217353a2457dda1158aef3fd00b3def46e7b455187d3e767c4f4902c19d10cb1eeca6c4c2d45b55f7f0df"}]}, 0x1280}, 0x1, 0x0, 0x0, 0x10}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r8, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:08:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r5, 0x40086425, &(0x7f0000000140)={r6, 0x2}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[]) 19:08:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) 19:08:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x1eb5) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) [ 1661.489112] hfs: can't find a HFS filesystem on dev loop0 19:08:36 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) [ 1661.608068] hfs: can't find a HFS filesystem on dev loop0 19:08:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[]) 19:08:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[]) 19:08:36 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) socket$inet(0x2, 0x4000000000000001, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) [ 1661.788454] hfs: can't find a HFS filesystem on dev loop0 [ 1661.897106] hfs: can't find a HFS filesystem on dev loop0 19:08:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB]) [ 1662.081071] hfs: can't find a HFS filesystem on dev loop0 19:08:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x1eb5) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) 19:08:36 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB]) 19:08:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x290581, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}]}, 0x28}, 0x1, 0x0, 0x0, 0x4860}, 0x44011) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB]) [ 1662.340396] hfs: can't find a HFS filesystem on dev loop0 19:08:36 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c600bab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = dup(r3) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000600)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 1662.524987] hfs: can't find a HFS filesystem on dev loop0 19:08:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00\x00']) 19:08:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) dup(r3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x1eb5) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) [ 1662.752666] hfs: unable to load codepage "cp8?" [ 1662.757566] hfs: unable to parse mount options 19:08:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce8", 0x0, 0x9}, 0x28) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='c']) 19:08:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) [ 1662.920091] hfs: unable to parse mount options 19:08:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='c']) 19:08:37 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0xa0, 0xfffffffe, 0x0, 0x8, 0x0, {0x3}, {0x0, 0xfffffffd}, {}, {}, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x400, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 19:08:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='c']) 19:08:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f00000009c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000980)={&(0x7f0000000a00)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x20000000}, 0xc000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) [ 1663.075115] hfs: unable to parse mount options [ 1663.210853] hfs: unable to parse mount options 19:08:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x1eb5) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) 19:08:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=']) 19:08:37 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:38 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=']) 19:08:38 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 1663.775635] hfs: unable to parse mount options 19:08:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:38 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=']) 19:08:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) 19:08:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:38 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?']) [ 1663.906282] hfs: unable to parse mount options 19:08:38 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:38 executing program 5: stat(&(0x7f0000000880)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r0, 0x0) r1 = getegid() r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x40, 0x50000) sendmsg$alg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)="3ab8a9a7d7b27f6e3546281a15", 0xd}, {&(0x7f00000000c0)="966ff3beb13bd71bde32593cce89346dfaefd4a1657feba27bdbf27421033623f5c878fcd23b1941f2bb21b08a35b2db67d958e0313af4d88d702c73b36fc9b14a583b60813e5212b0ac3383ba35c1dedf2ed2d2e3fe82554492d681b395a445525dfe064c00f3d8", 0x68}, {&(0x7f00000001c0)="ace6c1e02ae5cbcd91d5e8e28e793cc40cd953dd139497139783da50997299b78b734ea0f0688c693f4119bae90b817463d7300ac9d7ec25773e2b6f026b1336c1f743b87a62f625a607d691b41ba6412ddddd83f02571771c6942467050391cce73fc8a5c00e087bdc09d0f5286ede18ea4f131e39aa9c2433fcb3c4241ec5555209a190e6a6c189056b7e6a91bb612a183a77a1a26", 0x96}, {&(0x7f0000000280)="4ee4b3197337a9fa61a97be59a2b7dc46aa5e51e5634f1e69c194fec47a5faea4fcdf47131b1ad242f73657c4d4a47926993655523380d0ac3d04149b15347baf91f13cb15e31118b1c5421b13ed2de67e3e4b8babf03039663a0f466988931e0502e9e792252ccc7a7185fe574b66596a55d563bd23a9b637fda537798b73", 0x7f}, {&(0x7f0000000400)="bd59ca783e2027b2d2f7a792798cadce4473df1c8fb099eba591692696b71f6b3a187102ad463d7b13dff478b792742a020466e4cb1d15a8e8f1b58f07698284438c27d9801dd35090e3ad47a0cb28a435aadb06586ccfefa724b652c6b58682a0e728ba144703404c248841c5fb18aad6603f9bf55a270d05ed01c38b3d95ec3f153f883794b413d4df39ebb5bbdabd1bf1557a7bd4262fd0eec74eaf28c2e3202c3df7d8c997c46509077707c99051d5b0f75f", 0xb4}], 0x5, 0x0, 0x0, 0x4000000}, 0x60041) setresgid(r0, 0xee00, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) io_destroy(r4) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:38 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?']) 19:08:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:38 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?']) 19:08:38 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 1664.074131] hfs: unable to load codepage "cp8?" 19:08:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) [ 1664.074141] hfs: unable to parse mount options [ 1664.253149] hfs: unable to load codepage "cp8?" [ 1664.253162] hfs: unable to parse mount options [ 1664.448020] hfs: unable to load codepage "cp8?" [ 1664.448032] hfs: unable to parse mount options 19:08:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) 19:08:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00']) 19:08:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="800000001900010029bd7000fcdbdf2504000000690010003df27f0493680271b0fc91b1def6d3cdbc8221dd526413bdc9ece65a70b063257ac1df23a5793da7439391cbba6fe00fb0209207cf406cab689c1eeb780d0a2411adb8042687ad4173765dec9ddf0900e32669931327a05abc80b615713704f950b1081efe000000868b620401c7da49032091027fbc385fd0c42ec80508cb17850774af5eaeecc9181287f0ae302879c69262d61670a9c9c1352de3c40e62b1cdf9d9baff2ce998042d338a60588b65c4a424a22fdc0f9cb7d20c780b7dc97238168a8ce4504c0684f5a2330e535afe7d9f8953a4d814fdd260e018b1a44bea5a69cbc0945ab3c8af842e4c592fd9849110bedd36080d0d0c43a80bb8f34d8cf1e9"], 0x80}, 0x1, 0x0, 0x0, 0x20044812}, 0x20040090) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0x2579}, 0x16, 0x1) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:39 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 1665.012563] hfs: unable to load codepage "cp8?" 19:08:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00']) [ 1665.012576] hfs: unable to parse mount options 19:08:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) 19:08:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00\x00']) 19:08:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 1665.244885] hfs: unable to load codepage "cp8?" [ 1665.244895] hfs: unable to parse mount options [ 1665.422396] hfs: unable to load codepage "cp8?" 19:08:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00']) 19:08:39 executing program 5: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="98320eb3521b118b69efad0415871e8734c0fc9d1f8c462f65e44ab956dee5c6f88b01d9e6a1c68dce428e0f2ab469549ea903dad25b70e29c64e44540746701c3199e75ef057618a3ea316e9a89634d79cd4f9256f3d23e855a40eb61b90a532ae2ef1b832b154a3ddbb8317d5cca9a91dce7b9ea180b97a2c37164d2eb5b644d2051bd4b3af37f998e3d4431584ba55ce580a65405d31e0204", 0x9a, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r1, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x40003ad, 0x2000000) r2 = creat(&(0x7f0000000440)='./file0\x00', 0x1e) sendmsg$IPSET_CMD_GET_BYINDEX(r2, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0xf, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x24008004) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x28800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 19:08:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) 19:08:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:40 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00']) [ 1665.427164] hfs: unable to parse mount options [ 1665.605174] hfs: unable to load codepage "cp8?" [ 1665.605186] hfs: unable to parse mount options 19:08:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:40 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB='codepage=cp8?\x00']) [ 1665.802159] hfs: unable to load codepage "cp8?" 19:08:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) [ 1665.802171] hfs: unable to parse mount options 19:08:40 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) 19:08:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) [ 1665.963373] hfs: unable to load codepage "cp8?" 19:08:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x80}, 0x1, 0x0, 0x0, 0x20044812}, 0x20040090) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0x2579}, 0x16, 0x1) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 1665.963385] hfs: unable to parse mount options 19:08:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x80}, 0x1, 0x0, 0x0, 0x20044812}, 0x20040090) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0x2579}, 0x16, 0x1) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x7b9, &(0x7f0000000040)) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000001c00)={&(0x7f0000001a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001bc0)={0x0}, 0x1, 0x0, 0x0, 0x4040820}, 0x20010800) r2 = dup(0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f00000015c0)=""/4096, 0x1000}], 0x1, 0x1) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r5 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x38, r4, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x900}, 0x800) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, r4, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7fff, 0x3}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000000)={0x1, 0xc0, "b75586106363db49df370c52209d463ecad4022a0e478adf8c7fd186e352656b1f0ce8f8f1566c0961961ca569cc61075e5a2983901ce93dd449c6bc1d3ad0082d19773f1b97fa459d7fb6fc6416de93f7c80d37feeb0b1640c00e36a6757ba2eae3f825287610e0b22bfd102e714eb1ba41353f59036125dc64796800f396f54714c6bf720a103e671c1a1eafdc46b6111ad3ec3fe68adb1340377efddd1804506be6e9cd26fc0a08b0296ba8169844f3d2fe6ec4963edc5464539ad0a25b40"}) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8}) 19:08:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 1666.336958] Unknown ioctl 1074287107 19:08:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x80}, 0x1, 0x0, 0x0, 0x20044812}, 0x20040090) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0x2579}, 0x16, 0x1) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) [ 1666.426816] Unknown ioctl 1074287107 19:08:41 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) 19:08:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="98320eb3521b118b69efad0415871e8734c0fc9d1f8c462f65e44ab956dee5c6f88b01d9e6a1c68dce428e0f2ab469549ea903dad25b70e29c64e44540746701c3199e75ef057618a3ea316e9a89634d79cd4f9256f3d23e855a40eb61b90a532ae2ef1b832b154a3ddbb8317d5cca9a91dce7b9ea180b97a2c37164d2eb5b644d2051bd4b3af37f998e3d4431584ba55ce580a65405d31e0204", 0x9a, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r1, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x40003ad, 0x2000000) r2 = creat(&(0x7f0000000440)='./file0\x00', 0x1e) sendmsg$IPSET_CMD_GET_BYINDEX(r2, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0xf, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x24008004) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x28800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 19:08:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xb1, 0x40, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x20, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="98320eb3521b118b69efad0415871e8734c0fc9d1f8c462f65e44ab956dee5c6f88b01d9e6a1c68dce428e0f2ab469549ea903dad25b70e29c64e44540746701c3199e75ef057618a3ea316e9a89634d79cd4f9256f3d23e855a40eb61b90a532ae2ef1b832b154a3ddbb8317d5cca9a91dce7b9ea180b97a2c37164d2eb5b644d2051bd4b3af37f998e3d4431584ba55ce580a65405d31e0204", 0x9a, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r1, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x40003ad, 0x2000000) r2 = creat(&(0x7f0000000440)='./file0\x00', 0x1e) sendmsg$IPSET_CMD_GET_BYINDEX(r2, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0xf, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x24008004) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x28800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 19:08:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x480900, 0x0) sendmsg$nl_crypto(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@delrng={0x10, 0x14, 0x800, 0x70bd29, 0x25dfdbff, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4004800}, 0x40800) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:41 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x1}) 19:08:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0xa00, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {0x0, 0x81}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}) 19:08:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="98320eb3521b118b69efad0415871e8734c0fc9d1f8c462f65e44ab956dee5c6f88b01d9e6a1c68dce428e0f2ab469549ea903dad25b70e29c64e44540746701c3199e75ef057618a3ea316e9a89634d79cd4f9256f3d23e855a40eb61b90a532ae2ef1b832b154a3ddbb8317d5cca9a91dce7b9ea180b97a2c37164d2eb5b644d2051bd4b3af37f998e3d4431584ba55ce580a65405d31e0204", 0x9a, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendto$llc(r1, &(0x7f00000002c0)="874388e9ce5424bab695d78bbc094c23340375ed71c5a84a7f0f89a371095af052e30f039d96ae192fa6", 0x2a, 0x8000, 0x0, 0x0) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x40003ad, 0x2000000) r2 = creat(&(0x7f0000000440)='./file0\x00', 0x1e) sendmsg$IPSET_CMD_GET_BYINDEX(r2, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0xf, 0x6, 0x0, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x24008004) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x28800) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 19:08:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 19:08:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, 0x0, 0x0) 19:08:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}) 19:08:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, 0x0, 0x0) [ 1667.505227] INFO: trying to register non-static key. [ 1667.505229] the code is fine but needs lockdep annotation. [ 1667.505231] turning off the locking correctness validator. [ 1667.505240] CPU: 0 PID: 4749 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0 [ 1667.505244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1667.505247] Call Trace: [ 1667.505251] [ 1667.505271] dump_stack+0x13e/0x194 [ 1667.505282] register_lock_class+0x2fe/0x1600 [ 1667.505293] ? check_noncircular+0x20/0x20 [ 1667.505302] __lock_acquire+0x147/0x4620 [ 1667.505308] ? lock_downgrade+0x6e0/0x6e0 [ 1667.505319] ? trace_hardirqs_on+0x10/0x10 [ 1667.505325] ? save_trace+0x290/0x290 [ 1667.505331] ? __lock_acquire+0x5f7/0x4620 [ 1667.505337] ? save_trace+0x290/0x290 [ 1667.505346] ? find_held_lock+0x2d/0x110 [ 1667.505354] ? debug_object_deactivate+0x1cc/0x350 [ 1667.505362] lock_acquire+0x170/0x3f0 [ 1667.505374] ? try_to_wake_up+0x6a/0xef0 [ 1667.505385] _raw_spin_lock_irqsave+0x8c/0xbf [ 1667.505391] ? try_to_wake_up+0x6a/0xef0 [ 1667.505397] try_to_wake_up+0x6a/0xef0 [ 1667.505406] ? migrate_swap_stop+0x920/0x920 [ 1667.505412] ? lock_downgrade+0x6e0/0x6e0 [ 1667.505420] hrtimer_wakeup+0x43/0x60 [ 1667.505427] __hrtimer_run_queues+0x25c/0xbb0 [ 1667.505433] ? enqueue_hrtimer+0x3b0/0x3b0 [ 1667.505440] ? hrtimer_start_range_ns+0x1060/0x1060 [ 1667.505448] hrtimer_interrupt+0x1e6/0x5e0 [ 1667.505461] smp_apic_timer_interrupt+0x117/0x5e0 [ 1667.505468] apic_timer_interrupt+0x8f/0xa0 [ 1667.505471] [ 1667.505478] RIP: 0010:__sanitizer_cov_trace_pc+0x3d/0x50 [ 1667.505482] RSP: 0018:ffff88821334f3c8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10 [ 1667.505490] RAX: 0000000000040000 RBX: ffff8880200a0000 RCX: ffffc90005e3c000 [ 1667.505493] RDX: 000000000003ffff RSI: ffffffff831e5da3 RDI: ffff88821334f480 [ 1667.505497] RBP: 000000001fffffb0 R08: 000000000000ffff R09: ffffed1014b2b2b4 [ 1667.505502] R10: ffffed1014b2b2b3 R11: ffff8880a595959f R12: ffff888000128987 [ 1667.505506] R13: 0000000000000000 R14: 000000000000000f R15: 000000001fffffaf [ 1667.505594] ? vga16fb_fillrect+0x943/0x1880 [ 1667.505604] vga16fb_fillrect+0x943/0x1880 [ 1667.505615] bit_clear_margins+0x3af/0x480 [ 1667.505623] ? bit_bmove+0x1e0/0x1e0 [ 1667.505632] fbcon_clear_margins+0x285/0x310 [ 1667.505639] fbcon_switch+0xcdf/0x1780 [ 1667.505648] ? fbcon_set_def_font+0x370/0x370 [ 1667.505655] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1667.505668] ? set_origin+0x103/0x3b0 [ 1667.505674] ? fbcon_switch+0x2/0x1780 [ 1667.505680] redraw_screen+0x331/0x770 [ 1667.505688] ? con_flush_chars+0x80/0x80 [ 1667.505694] ? fbcon_set_palette+0x470/0x590 [ 1667.505701] fbcon_modechanged+0x59d/0x890 [ 1667.505710] fbcon_event_notify+0x11a/0x1746 [ 1667.505718] ? lock_acquire+0x1ec/0x3f0 [ 1667.505727] notifier_call_chain+0x107/0x1a0 [ 1667.505736] blocking_notifier_call_chain+0x79/0x90 [ 1667.505743] fb_set_var+0xaad/0xc70 [ 1667.505750] ? fb_set_suspend+0x110/0x110 [ 1667.505756] ? lock_acquire+0x1ec/0x3f0 [ 1667.505763] ? lock_fb_info+0x1a/0x70 [ 1667.505771] ? __mutex_lock+0x36a/0x1470 [ 1667.505777] ? trace_hardirqs_on+0x10/0x10 [ 1667.505782] ? save_trace+0x290/0x290 [ 1667.505820] ? futex_wait_queue_me+0x1d7/0x590 [ 1667.505829] ? mutex_trylock+0x1a0/0x1a0 [ 1667.505839] ? do_fb_ioctl+0x36a/0x940 [ 1667.505846] do_fb_ioctl+0x3cc/0x940 [ 1667.505852] ? lock_downgrade+0x6e0/0x6e0 [ 1667.505857] ? fb_read+0x520/0x520 [ 1667.505866] ? avc_has_extended_perms+0x802/0xd40 [ 1667.505872] ? futex_wake+0x11c/0x3d0 [ 1667.505878] ? avc_ss_reset+0x100/0x100 [ 1667.505884] ? __lock_acquire+0x5f7/0x4620 [ 1667.505893] ? __lock_acquire+0x5f7/0x4620 [ 1667.505900] ? retint_kernel+0x2d/0x2d [ 1667.505906] ? retint_kernel+0x2d/0x2d [ 1667.505920] fb_ioctl+0xdd/0x130 [ 1667.505925] ? do_fb_ioctl+0x940/0x940 [ 1667.505934] do_vfs_ioctl+0x75a/0xfe0 [ 1667.505942] ? selinux_file_mprotect+0x5c0/0x5c0 [ 1667.505949] ? ioctl_preallocate+0x1a0/0x1a0 [ 1667.505960] ? security_file_ioctl+0x76/0xb0 [ 1667.505966] ? security_file_ioctl+0x83/0xb0 [ 1667.505973] SyS_ioctl+0x7f/0xb0 [ 1667.505979] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1667.505988] do_syscall_64+0x1d5/0x640 [ 1667.505996] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1667.506002] RIP: 0033:0x45c479 [ 1667.506005] RSP: 002b:00007fda09337c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1667.506011] RAX: ffffffffffffffda RBX: 00007fda093386d4 RCX: 000000000045c479 [ 1667.506014] RDX: 0000000020000340 RSI: 0000000000004601 RDI: 0000000000000004 [ 1667.506018] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1667.506021] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1667.506025] R13: 00000000000002ef R14: 00000000004c5096 R15: 000000000076bf2c [ 1667.506127] BUG: unable to handle kernel paging request at ffffffffffffff74 [ 1667.506139] IP: wait_consider_task+0x99/0x3030 [ 1667.506142] PGD 7c6d067 P4D 7c6d067 PUD 7c6f067 PMD 0 [ 1667.506154] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1667.506159] Modules linked in: [ 1667.506167] CPU: 0 PID: 7482 Comm: syz-executor.5 Not tainted 4.14.172-syzkaller #0 [ 1667.506171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1667.506174] task: ffff8880983c2180 task.stack: ffff888090eb8000 [ 1667.506181] RIP: 0010:wait_consider_task+0x99/0x3030 [ 1667.506184] RSP: 0018:ffff888090ebfb30 EFLAGS: 00010246 [ 1667.506190] RAX: 0000000000000007 RBX: 0000000000000000 RCX: ffffffffffffff74 [ 1667.506193] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888090ebfd08 [ 1667.506197] RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000000 [ 1667.506201] R10: 1ffff110121d7ff9 R11: ffff8880983c2180 R12: ffff888090ebfd08 [ 1667.506205] R13: fffffffffffffaf8 R14: fffffffffffffaf8 R15: ffff888090ebfd08 [ 1667.506211] FS: 0000000001c72940(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 1667.506215] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1667.506219] CR2: ffffffffffffff74 CR3: 00000000809bd000 CR4: 00000000001426f0 [ 1667.506226] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1667.506230] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1667.506232] Call Trace: [ 1667.506243] ? lock_acquire+0x170/0x3f0 [ 1667.506251] ? release_task+0x1430/0x1430 [ 1667.506256] ? do_wait+0x362/0x930 [ 1667.506293] ? add_wait_queue+0x44/0x150 [ 1667.506301] do_wait+0x3e9/0x930 [ 1667.506311] ? wait_consider_task+0x3030/0x3030 [ 1667.506319] kernel_wait4+0x103/0x1e0 [ 1667.506325] ? SyS_waitid+0x40/0x40 [ 1667.506333] ? task_stopped_code+0x140/0x140 [ 1667.506340] ? lock_downgrade+0x6e0/0x6e0 [ 1667.506348] SYSC_wait4+0x106/0x110 [ 1667.506355] ? kernel_wait4+0x1e0/0x1e0 [ 1667.506363] ? _copy_to_user+0x82/0xd0 [ 1667.506377] ? put_timespec64+0xaa/0xf0 [ 1667.506383] ? nsecs_to_jiffies+0x30/0x30 [ 1667.506393] ? SyS_clock_gettime+0xf5/0x180 [ 1667.506400] ? SyS_clock_settime+0x1a0/0x1a0 [ 1667.506407] ? C_SYSC_wait4+0x110/0x110 [ 1667.506414] do_syscall_64+0x1d5/0x640 [ 1667.506423] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1667.506428] RIP: 0033:0x4162ba [ 1667.506431] RSP: 002b:00007ffcd3dc0a98 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 1667.506437] RAX: ffffffffffffffda RBX: 00000000001970d4 RCX: 00000000004162ba [ 1667.506441] RDX: 0000000040000001 RSI: 00007ffcd3dc0ad0 RDI: ffffffffffffffff [ 1667.506445] RBP: 0000000000001c6b R08: 0000000000000001 R09: 0000000001c72940 [ 1667.506449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1667.506453] R13: 00007ffcd3dc0ad0 R14: 00000000001970a5 R15: 00007ffcd3dc0ae0 [ 1667.506460] Code: 8d 8e 7c 04 00 00 48 89 c8 48 89 4c 24 08 48 c1 e8 03 0f b6 14 28 48 89 c8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e6 14 00 00 <41> 8b ae 7c 04 00 00 83 fd 10 0f 84 a1 00 00 00 e8 d2 af 23 00 [ 1667.506580] RIP: wait_consider_task+0x99/0x3030 RSP: ffff888090ebfb30 [ 1667.506583] CR2: ffffffffffffff74 [ 1667.506592] ---[ end trace 5eca494db5e7b1bc ]--- [ 1667.506595] Kernel panic - not syncing: Fatal exception [ 1667.508133] Kernel Offset: disabled [ 1668.259315] Rebooting in 86400 seconds..