bj_type', 0x3d, 'sysfs\x00'}}, {@subj_role={'subj_role', 0x3d, 'sysfs\x00'}}, {@euid_gt={'euid>', r12}}, {@obj_user={'obj_user', 0x3d, 'sysfs\x00'}}]}}) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) 03:43:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000000)=0x2, 0x4) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000700)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000f8020000d0010000d0010000d001000000000000000000006002000060020000600200006002000060020000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006801d0010000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020300000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4ff00000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x800001d, 0x0) 03:43:01 executing program 4: r0 = socket(0x10, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:02 executing program 2: r0 = socket(0x10, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xfea2, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) [ 247.389917] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 247.400648] ip_tables: iptables: counters copy to user failed while replacing table [ 247.409909] hfs: type requires a 4 character value [ 247.417824] hfs: unable to parse mount options [ 247.425857] ip_tables: iptables: counters copy to user failed while replacing table 03:43:02 executing program 4: r0 = socket(0x10, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) [ 247.646976] hfs: type requires a 4 character value [ 247.684578] hfs: unable to parse mount options 03:43:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 247.710267] hfs: type requires a 4 character value [ 247.727525] hfs: unable to parse mount options 03:43:02 executing program 4: socket(0x10, 0x80002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x401000) setsockopt$ax25_SO_BINDTODEVICE(r3, 0x101, 0x19, &(0x7f0000000080)=@bpq0='bpq0\x00', 0x10) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, [@IFLA_MACVLAN_MODE={0x8, 0x3}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SIOCSIFMTU(r6, 0x8922, &(0x7f0000000000)={'ip6_vti0\x00', 0x3}) 03:43:02 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_IRQP_SET(r7, 0x4008700c, 0x101b) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r9, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r8, r9, 0x0) 03:43:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) 03:43:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000880)) r1 = socket(0x1, 0x2, 0x0) socket(0x1, 0x2, 0x0) getpgid(0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = gettid() sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="4c00000010000100"/20, @ANYRES32=r3, @ANYBLOB="000000000000000008001300", @ANYRES32=r5, @ANYBLOB="24000e00cf09810000000000000000004000"/45], 0x4c}}, 0x0) ptrace$peeksig(0x4209, r5, &(0x7f0000000040)={0x33b, 0x0, 0x6}, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}]) r6 = getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f00000001c0)={0x0, 0x3, 0x0, 0x0, r6}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000540)=""/193) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r7, 0xae03, 0x3c) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000140)='sit0\x00') r9 = inotify_init1(0x0) fcntl$setown(r9, 0x8, 0xffffffffffffffff) fcntl$getownex(r9, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r10, r6, 0x7913709e57048ee5, r8, r1) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r11, &(0x7f0000000180)={0x0, 0x1f00, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1c}, 0x1, 0xfdffffff00000000}, 0x0) 03:43:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 247.961132] ip6_vti0: Invalid MTU 3 requested, hw min 1280 [ 247.993443] hfs: type requires a 4 character value [ 248.004651] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 248.009292] hfs: unable to parse mount options 03:43:02 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000047c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) connect$nfc_llcp(r0, &(0x7f0000004800)={0x27, 0x1, 0x1, 0x6, 0xff, 0x3f, "2a063521f57014e0bbe432ce9a69969e38502eb527c85afefd55361c4245ac2edb08509bfca109552fbc70c75f3ea0e88162316394b124685890e193701d38", 0x36}, 0x60) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) r2 = dup(r1) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={@empty}) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="c418f0ff26c5c17135eaf51e0fbcf120690262386e9c89b4980666393256f83af8df5b610962b98276c6c04442a0cca016b34ecd95191556bc4c29544f98e2e4666beb473952f44f4db7faddfd16bfb8053bf6fd9fad4b171cee609aa3a1b3513622ed2cf1bba4f9866df82f07f99abcff434d5a50e9d6f925cc36bcbbf6c5d8dad8772d311eaed542b9bf0e", 0x8c, 0x2}, {&(0x7f0000000400)="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", 0xffffff87, 0xe99b}], 0x200c0, &(0x7f00000003c0)=ANY=[@ANYBLOB='q?qxl\x00'/19]) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040), 0x4) 03:43:02 executing program 4: socket(0x10, 0x80002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 248.455756] hfs: type requires a 4 character value [ 248.473875] hfs: unable to parse mount options 03:43:03 executing program 4: socket(0x10, 0x80002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 248.731675] QAT: Invalid ioctl 03:43:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_IRQP_SET(r7, 0x4008700c, 0x101b) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r9, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r8, r9, 0x0) [ 248.761276] hfs: type requires a 4 character value [ 248.768449] hfs: unable to parse mount options [ 248.772519] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 03:43:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) 03:43:03 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x0, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:03 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x7}, 0x339) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)='*', 0xb0}], 0x1}, 0x0) write(r0, &(0x7f0000000040)='D', 0x1) 03:43:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000880)) r1 = socket(0x1, 0x2, 0x0) socket(0x1, 0x2, 0x0) getpgid(0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = gettid() sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="4c00000010000100"/20, @ANYRES32=r3, @ANYBLOB="000000000000000008001300", @ANYRES32=r5, @ANYBLOB="24000e00cf09810000000000000000004000"/45], 0x4c}}, 0x0) ptrace$peeksig(0x4209, r5, &(0x7f0000000040)={0x33b, 0x0, 0x6}, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}]) r6 = getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f00000001c0)={0x0, 0x3, 0x0, 0x0, r6}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000540)=""/193) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r7, 0xae03, 0x3c) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000140)='sit0\x00') r9 = inotify_init1(0x0) fcntl$setown(r9, 0x8, 0xffffffffffffffff) fcntl$getownex(r9, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r10, r6, 0x7913709e57048ee5, r8, r1) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r11, &(0x7f0000000180)={0x0, 0x1f00, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1c}, 0x1, 0xfdffffff00000000}, 0x0) [ 248.944537] hfs: type requires a 4 character value [ 248.954106] hfs: unable to parse mount options 03:43:03 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x0, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) close(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000540)={{0x8, 0x0, 0x8, 0xf7, '\x00', 0x763e}, 0x0, [0x7, 0x9, 0x3, 0x7, 0x8, 0x1f, 0x9a8c, 0x5, 0x1, 0x1, 0xa96d, 0x0, 0x5, 0x2, 0x2, 0x1ff, 0x0, 0xff, 0x6, 0x8, 0x7, 0xf0402b8, 0x3, 0x3, 0x1, 0xa00000000000, 0x2, 0x20, 0x3f, 0x331, 0x7ff, 0x6, 0x8, 0x6, 0x7fffffff, 0x100000000, 0x3, 0xffffffffffffffa8, 0x7fffffff, 0x9, 0x40, 0x1, 0xff, 0x1, 0x4, 0x8, 0x8, 0x20, 0x62, 0x1f, 0x3, 0xfff, 0x3, 0xe0, 0x4, 0x1, 0x4, 0x3, 0x1, 0x5, 0xe1d5, 0x3, 0xffff, 0x2, 0x0, 0x80000000, 0x800, 0x2, 0x7, 0x0, 0x1f, 0x8001, 0x2, 0xffffffffffffffff, 0x7, 0x2, 0xff, 0xfffffffffffffff8, 0x0, 0x5, 0x7, 0x8000000000003, 0x3, 0x6, 0x1f, 0x9, 0x8, 0x9, 0x3, 0x4, 0xfffffffffffffffe, 0x3ff, 0xff, 0x7, 0x1, 0xffff, 0xfffffffeffffffff, 0xfffffffffffffffc, 0xfffffffffffffff9, 0x4, 0x3ff, 0x6, 0x7f, 0xffffffffffffffff, 0x7890, 0x0, 0x0, 0x0, 0xd9, 0x8, 0x8001, 0x7, 0xffffffffffff93da, 0x5, 0x6, 0xfff, 0xfffffffffffffffb, 0x7, 0x9, 0x1789, 0x401, 0x5, 0x7f, 0x5, 0x7, 0x0, 0x3, 0x9]}) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket(0x10, 0x80002, 0xc) sendmsg(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000020607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb0100180300000000000000000000a800000008000000000000000200000d00000000020000000200000006000002030000000a0000000000000b050000001000000006000084b20000000600000001000000080000000700000003000000040000000500000005000000008000000500000005000000ff03000005000000050000007c060000060000000400000055030000000000000400000d000000000b00000000000000030000000100000008000000030000000a000000020000000061013061613000"], &(0x7f00000001c0)=""/99, 0xc8, 0x63}, 0x20) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r4, &(0x7f0000000240)={0xffffffffffffffff, r5, 0x9}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = memfd_create(&(0x7f0000000080)='keyring[)mime_typewlan1-selinuxvboxnet0$nodeveth0\x00', 0x0) write(r6, &(0x7f0000000040)="06", 0x1) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000000c0)={0x2}, 0x4) sendfile(r6, r6, &(0x7f0000001000), 0xffff) [ 249.246769] hfs: type requires a 4 character value [ 249.257532] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 249.273729] hfs: unable to parse mount options 03:43:03 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x0, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 249.403744] hfs: type requires a 4 character value [ 249.428052] hfs: unable to parse mount options 03:43:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) 03:43:04 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) [ 249.939276] hfs: type requires a 4 character value [ 249.952088] hfs: unable to parse mount options 03:43:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r9, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r8, r9, 0x0) 03:43:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') getdents(r3, &(0x7f0000000440)=""/46, 0x2e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getdents(r9, &(0x7f0000005580)=""/4101, 0xfffffffffffffd1d) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000001100)={0xaa, 0x8}) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001080)='./cgroup/syz0\x00', 0x200002, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, 0x0) socket$inet6(0xa, 0x0, 0x0) msync(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) sendto$inet(r0, &(0x7f0000000000)='\x00'/13, 0xd, 0x8008, 0x0, 0x0) close(r0) 03:43:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(0xffffffffffffffff, 0xc06c4124, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={{0x0, 0x989680}}, &(0x7f0000000100)) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(r5) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r6) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r9, 0xc0585611, &(0x7f0000000380)={0x20, 0x6, 0x4, 0x40000, 0x8, {0x0, 0x7530}, {0x1, 0x1, 0xff, 0x7f, 0x0, 0xcc, "3aec32ae"}, 0xfffffeff, 0x1, @userptr=0x8001, 0x100, 0x0, r6}) ioctl$SIOCRSACCEPT(r4, 0x89e3) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x9102, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 03:43:04 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) [ 250.376752] hfs: type requires a 4 character value [ 250.382901] hfs: unable to parse mount options 03:43:05 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$llc_int(r5, 0x10c, 0x5, &(0x7f0000000140), &(0x7f0000000180)=0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r2, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r7, 0x10e, 0x8, &(0x7f0000000040), 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000000100000019000300e60100006c000000000000000100000004000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 03:43:05 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x2, @local, 0x2}, @in6={0xa, 0x4e22, 0xfffffffe, @rand_addr="b2e63299fef1d468f52d5c707c958fb3", 0xfff80000}], 0x38) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xf, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000003000050ad22780648c6394fb0107fc001007b8400c000200053582c137153e370900018025731700d1bd", 0x2e}], 0x1}, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xaea0d20a99fd0ba0) ioctl$KVM_S390_INTERRUPT_CPU(r3, 0x4010ae94, &(0x7f0000000100)={0x80000001, 0xfffffff7, 0x2}) 03:43:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) [ 250.979856] hfs: type requires a 4 character value [ 251.002991] hfs: unable to parse mount options [ 251.007758] EXT4-fs (loop0): fragment/cluster size (16384) != block size (2048) 03:43:05 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r8, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r9 = socket$inet6(0xa, 0x1, 0x0) dup2(r9, r8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r9, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r8, r9, 0x0) 03:43:05 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) io_setup(0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) r5 = getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r8, 0xc1105517, &(0x7f0000000540)={{}, 0x0, 0x200, 0x4, r5, 0x1, 0xfffffffd, 'syz0\x00', &(0x7f0000000000)=['nodev\x00'], 0x6, [], [0xfffd, 0x1]}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000540)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) r9 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r9, 0xc1105517, &(0x7f0000000540)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x3, 0x0, 0x9, 0x0, 0x1, 0x0, 'syz0\x00', &(0x7f0000000000)=['nodev\x00'], 0x6}) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x40, &(0x7f0000000980)=ANY=[]) r10 = socket(0x10, 0x800000000000803, 0x0) sendto(r10, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r10, &(0x7f0000000c00)=[{{0x0, 0x0, 0x0}}], 0x159, 0x40000022, 0x0) pipe(&(0x7f0000000040)) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) splice(r11, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r13 = socket$inet_udp(0x2, 0x2, 0x0) close(r13) splice(r12, 0x0, r13, 0x0, 0x4ffe0, 0x0) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000009c0)=ANY=[@ANYBLOB="6f11dea7cdaac0b3ccc7d2da8b0f741adfcecc17dde912c12c63257a7bddddee9880d5a2b63e952495e57373505ef5db47b96ae8982fc2523f5c6d0eecee8205000000f2ae2968691516cedc5896ed2cce133f9dbfe1b9d6d0debf60bf181055ef84b6fc5e9d0cd32a6bdf4b49505d18bf1925729edeac5d1f056986a4189073c8751300c949729d25b1b26b2b13d914ba85543bf695", @ANYRES16=r14, @ANYBLOB="110e0000000000000001000064b6006700014100000000001700e90000000000003a20000000343ecec3e8a66139f7c1ff8eb9b137f222a85cfba8ef79802c1d5bb27cc724c6a5c6d8"], 0x3}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="c4000000", @ANYRES16, @ANYBLOB="110e00000000000000000100000000e372a31500000001410000ff92001700000000000000003a000000"], 0xc4}}, 0x0) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) [ 251.362372] hfs: type requires a 4 character value [ 251.373538] hfs: unable to parse mount options 03:43:06 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) [ 251.449989] hfs: type requires a 4 character value 03:43:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r8, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r9 = socket$inet6(0xa, 0x1, 0x0) dup2(r9, r8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 251.702860] hfs: unable to parse mount options 03:43:06 executing program 0: mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x10001, 0x80000) write(r0, &(0x7f0000000200)="683c8c5be9aa5e17ae8f08c734569f78d5ea8d84867c4d8205870cec", 0x1c) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000080)={'dummy0\x00', 0x45}) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r4, &(0x7f0000077000)=""/117, 0x75) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r5, 0x103, 0x6, &(0x7f0000000100), 0x4) getsockname(r5, &(0x7f0000000140)=@l2tp={0x2, 0x0, @loopback}, &(0x7f0000000000)=0x80) 03:43:06 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) 03:43:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) 03:43:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) [ 251.895062] hfs: type requires a 4 character value [ 251.900620] hfs: unable to parse mount options 03:43:06 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9b") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r9, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r8, r9, 0x0) 03:43:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r8, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r9 = socket$inet6(0xa, 0x1, 0x0) dup2(r9, r8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 252.252382] hfs: type requires a 4 character value [ 252.261623] hfs: unable to parse mount options 03:43:06 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9b") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) [ 252.364331] hfs: type requires a 4 character value [ 252.369860] hfs: unable to parse mount options 03:43:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:07 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9b") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) [ 252.699219] hfs: type requires a 4 character value [ 252.715258] hfs: unable to parse mount options 03:43:07 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe869") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 253.058827] hfs: type requires a 4 character value [ 253.081258] hfs: unable to parse mount options 03:43:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:07 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:07 executing program 0: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xa925, 0x2b}) socket(0x1e, 0x4, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPCONNDEL(r4, 0x400443c9, &(0x7f0000000080)={{0x8, 0x8, 0x5, 0x20, 0x8, 0x81}, 0xb01e}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 03:43:07 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe869") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 253.197030] hfs: type requires a 4 character value [ 253.202627] hfs: unable to parse mount options 03:43:07 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe869") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 253.504475] hfs: type requires a 4 character value [ 253.509562] hfs: unable to parse mount options 03:43:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r4, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r5 = socket$inet6(0xa, 0x1, 0x0) dup2(r5, r4) 03:43:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r8, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r9, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r10 = socket$inet6(0xa, 0x1, 0x0) dup2(r10, r9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:08 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe86960") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) [ 253.653829] hfs: type requires a 4 character value [ 253.663580] hfs: unable to parse mount options 03:43:08 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe86960") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r8, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r9 = socket$inet6(0xa, 0x1, 0x0) dup2(r9, r8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0xc0140000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0x12d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0xa4801) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000040)={0x1000000000000000, 0x0, 0x6, 0x4, 0x1e}) ptrace$cont(0x20, r0, 0x0, 0x0) [ 254.013105] hfs: type requires a 4 character value [ 254.018229] hfs: unable to parse mount options 03:43:08 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe86960") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) [ 254.117360] hfs: type requires a 4 character value [ 254.123592] hfs: unable to parse mount options 03:43:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r8, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r9 = socket$inet6(0xa, 0x1, 0x0) dup2(r9, r8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:08 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) [ 254.345327] IPVS: ftp: loaded support on port[0] = 21 03:43:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r4, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r5 = socket$inet6(0xa, 0x1, 0x0) dup2(r5, r4) 03:43:09 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r8, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r9 = socket$inet6(0xa, 0x1, 0x0) dup2(r9, r8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:09 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r7, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r8, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r9 = socket$inet6(0xa, 0x1, 0x0) dup2(r9, r8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:09 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r4, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r5 = socket$inet6(0xa, 0x1, 0x0) dup2(r5, r4) 03:43:09 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r4, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r5 = socket$inet6(0xa, 0x1, 0x0) dup2(r5, r4) 03:43:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:09 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24fd5f61707040616973652c00"]) 03:43:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r6) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:10 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:43:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r5, r6, 0x0) 03:43:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) 03:43:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r4, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r5 = socket$inet6(0xa, 0x1, 0x0) dup2(r5, r4) 03:43:11 executing program 2: bind$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unshare(0x20600) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x6}, 0x800, 0x2, 0x0, 0x8, 0x63a4, 0x8000, 0xfff5}, 0x0, 0x0, 0xffffffffffffffff, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = semget(0x3, 0x1, 0x28) r3 = semget$private(0x0, 0x7, 0x110) semctl$GETPID(r3, 0x0, 0xb, &(0x7f0000000080)=""/54) semctl$GETPID(r2, 0x2, 0xb, &(0x7f0000000200)=""/69) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r5) r6 = open(&(0x7f0000000180)='./file0\x00', 0x100, 0x8) fchdir(r6) ioctl$TIOCL_GETKMSGREDIRECT(r6, 0x541c, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) r8 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r8, 0xae45, 0xfff) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1}) setfsgid(0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r9 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x10000000, 0x480a00) faccessat(r9, &(0x7f00000001c0)='./file0\x00', 0x10, 0x400) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000180)=r9) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000000c0)={0x0, r9}) r10 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r10, 0x200004) [ 256.388805] hfs: can't find a HFS filesystem on dev loop4 03:43:11 executing program 2: syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x1, 0x10200) r0 = dup(0xffffffffffffffff) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000340), 0x4) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffb000/0x1000)=nil, 0x1000}, 0x2}) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) socket(0x8, 0x806, 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') write$binfmt_misc(r3, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x58) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xb) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7b, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000200)={r8, 0x58, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x39, @dev={0xfe, 0x80, [], 0xc}, 0x693bd245}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e22, 0xae7b, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2a}}, 0x8}, @in={0x2, 0x4e21, @local}]}, &(0x7f0000000240)=0x10) r9 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x2, 0x0, 0xfffffdac) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8642957429963afa, @perf_bp={0x0, 0x8}, 0x10080, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) fsetxattr(r10, &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f00000003c0)='threaded\x00', 0x9, 0x2) clone(0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="18f60a2111586ff65f2573aab50febd1d64fbb4158f63355602481443fece7a1f642d7754be2dbbcd0a5afdcf5e5f5fa7bac7fa790a735e74bb290d2ccdd91d9eacb6ed623261827e03be7b7622d9dabee3c4c88") 03:43:11 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 256.770700] sd 0:0:1:0: [sg0] tag#2988 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 256.779666] sd 0:0:1:0: [sg0] tag#2988 CDB: Test Unit Ready [ 256.785547] sd 0:0:1:0: [sg0] tag#2988 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.794663] sd 0:0:1:0: [sg0] tag#2988 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.803624] sd 0:0:1:0: [sg0] tag#2988 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:43:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 256.812663] sd 0:0:1:0: [sg0] tag#2988 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.821624] sd 0:0:1:0: [sg0] tag#2988 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.830590] sd 0:0:1:0: [sg0] tag#2988 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.839575] sd 0:0:1:0: [sg0] tag#2988 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.849034] sd 0:0:1:0: [sg0] tag#2988 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.858060] sd 0:0:1:0: [sg0] tag#2988 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.866995] sd 0:0:1:0: [sg0] tag#2988 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.876857] sd 0:0:1:0: [sg0] tag#2988 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.885795] sd 0:0:1:0: [sg0] tag#2988 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.894716] sd 0:0:1:0: [sg0] tag#2988 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.903654] sd 0:0:1:0: [sg0] tag#2988 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.912601] sd 0:0:1:0: [sg0] tag#2988 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 256.927168] hfs: can't find a HFS filesystem on dev loop4 03:43:11 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:43:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 257.057125] hfs: can't find a HFS filesystem on dev loop4 03:43:11 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[]) 03:43:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) 03:43:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r5, r6, 0x0) 03:43:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1f}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000100)={0x0, 0x1}, 0xfffffffffffffdca) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x200, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f00000002c0)={0x1, 0x1020000, "cfe5f9f4b1ee72e239b8337430bfe1c5bf5410264b19b75e", {0x4, 0x123}, 0x8}) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x1) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockname$ax25(r4, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r6 = socket(0x10, 0x0, 0x0) sendto(r6, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0xfffffd01}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xffffffffffffff6f}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) fcntl$notify(r6, 0x402, 0x80000000) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x1, 0x0, 0x0, 0x0, 0x0, 0x152}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[0x0]) write(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) socket(0x10, 0x80002, 0x0) [ 257.227660] sd 0:0:1:0: [sg0] tag#2988 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 257.236618] sd 0:0:1:0: [sg0] tag#2988 CDB: Test Unit Ready [ 257.242444] sd 0:0:1:0: [sg0] tag#2988 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.251372] sd 0:0:1:0: [sg0] tag#2988 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.260296] sd 0:0:1:0: [sg0] tag#2988 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.269348] sd 0:0:1:0: [sg0] tag#2988 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.274274] hfs: can't find a HFS filesystem on dev loop4 [ 257.278530] sd 0:0:1:0: [sg0] tag#2988 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.293062] sd 0:0:1:0: [sg0] tag#2988 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.301989] sd 0:0:1:0: [sg0] tag#2988 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.310896] sd 0:0:1:0: [sg0] tag#2988 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:43:11 executing program 1: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 257.319767] sd 0:0:1:0: [sg0] tag#2988 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.329206] sd 0:0:1:0: [sg0] tag#2988 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.338114] sd 0:0:1:0: [sg0] tag#2988 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.347043] sd 0:0:1:0: [sg0] tag#2988 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.355954] sd 0:0:1:0: [sg0] tag#2988 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.364872] sd 0:0:1:0: [sg0] tag#2988 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 257.373773] sd 0:0:1:0: [sg0] tag#2988 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 03:43:12 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[]) 03:43:12 executing program 1: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 257.734306] hfs: can't find a HFS filesystem on dev loop4 03:43:12 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[]) 03:43:12 executing program 1: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:12 executing program 2: syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x1, 0x10200) r0 = dup(0xffffffffffffffff) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000340), 0x4) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffb000/0x1000)=nil, 0x1000}, 0x2}) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) socket(0x8, 0x806, 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') write$binfmt_misc(r3, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x58) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xb) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7b, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000200)={r8, 0x58, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x39, @dev={0xfe, 0x80, [], 0xc}, 0x693bd245}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e22, 0xae7b, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2a}}, 0x8}, @in={0x2, 0x4e21, @local}]}, &(0x7f0000000240)=0x10) r9 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x2, 0x0, 0xfffffdac) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8642957429963afa, @perf_bp={0x0, 0x8}, 0x10080, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) fsetxattr(r10, &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f00000003c0)='threaded\x00', 0x9, 0x2) clone(0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="18f60a2111586ff65f2573aab50febd1d64fbb4158f63355602481443fece7a1f642d7754be2dbbcd0a5afdcf5e5f5fa7bac7fa790a735e74bb290d2ccdd91d9eacb6ed623261827e03be7b7622d9dabee3c4c88") [ 258.059132] hfs: can't find a HFS filesystem on dev loop4 03:43:12 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB]) [ 258.144420] sd 0:0:1:0: [sg0] tag#2988 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 258.153493] sd 0:0:1:0: [sg0] tag#2988 CDB: Test Unit Ready [ 258.159258] sd 0:0:1:0: [sg0] tag#2988 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.164700] hfs: can't find a HFS filesystem on dev loop4 [ 258.168684] sd 0:0:1:0: [sg0] tag#2988 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.183130] sd 0:0:1:0: [sg0] tag#2988 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.192169] sd 0:0:1:0: [sg0] tag#2988 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.201093] sd 0:0:1:0: [sg0] tag#2988 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.209963] sd 0:0:1:0: [sg0] tag#2988 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.218890] sd 0:0:1:0: [sg0] tag#2988 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.228181] sd 0:0:1:0: [sg0] tag#2988 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.237144] sd 0:0:1:0: [sg0] tag#2988 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.246369] sd 0:0:1:0: [sg0] tag#2988 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.255326] sd 0:0:1:0: [sg0] tag#2988 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.264272] sd 0:0:1:0: [sg0] tag#2988 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.273212] sd 0:0:1:0: [sg0] tag#2988 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 258.282125] sd 0:0:1:0: [sg0] tag#2988 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:43:12 executing program 0: signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xaca}, 0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_mcast\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x8250b49b5930af9b, 0x31) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setflags(r2, 0x2, 0x2ca137d2c5a93f27) dup(r2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x4001fd) bind(r2, &(0x7f0000000040)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x80) sendfile(r1, r0, 0x0, 0x209) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x37a1, @loopback, 0x1}}, 0x9, 0x8}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r6, 0x4}, &(0x7f0000000240)=0x8) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$VIDIOC_S_EDID(r7, 0xc0285629, &(0x7f0000000300)={0x0, 0x9, 0x5, [], &(0x7f00000002c0)=0x8}) [ 258.291054] sd 0:0:1:0: [sg0] tag#2988 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 03:43:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) 03:43:12 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB]) 03:43:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r5, r6, 0x0) 03:43:13 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 258.443395] hfs: can't find a HFS filesystem on dev loop4 03:43:13 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB]) 03:43:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) io_submit(0x0, 0x20000000000000dd, &(0x7f00000006c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8000451b, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)="89", 0x1, 0x4000800, &(0x7f0000000240)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0xfffffffffffffc8e) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c757365725f69643d6f03b8ff39388f71d4d5186ca2c53273be4e1a439d167748588d85e0541a5dfbef32db23ab8513594b26384c3ad0f8c6955eb83004a02a7ec2d3f8cc5372", @ANYBLOB="00000000000000008ac0cc6f9a06ee5cc4c9fbf306c5fdf25d6302f654017076b6cf2a34d34618b19d95a6750b346aba7320f70180b58e7beaeecef48937484966c4cde2bb990cb5bf226e727f4269b38320bc83e92637c5e314b60c87e2dc8b1d2bd90cdc92f7eee964168e32d73f7741bb1a8aed7b5a940f1726e4998d2d7dfc1ebb2094878c7d97ffaae4e780de03ecd6b2168e2c44ec605b64a1338c791fdbfd729b3373d8b6786fe6d3b754baea80dbfdf8755184cde4b889f637fa764225de1c2099290431dea033eb7c", @ANYRESDEC=0x0, @ANYBLOB]) r5 = socket(0x10, 0x800000000000803, 0x0) sendto(r5, &(0x7f0000000000)="120000001600e70d017b00d473fc00000000", 0x12, 0x0, 0x0, 0xaee6dae35afa37fd) recvmmsg(r5, &(0x7f0000000c00)=[{{0x0, 0x0, 0x0}}], 0x159, 0x40000022, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(0xffffffffffffffff, 0x0, r6, 0x0, 0x4ffe0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) splice(r7, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) pipe(&(0x7f0000000040)) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) r10 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000680)) r12 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r12, &(0x7f00000003c0)=""/76, 0x25) getdents(r12, &(0x7f0000001440)=""/177, 0x18) splice(r8, 0x0, r11, 0x0, 0x7, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x34, r13, 0xe11}, 0x34}}, 0x0) r14 = socket$nl_generic(0x10, 0x3, 0x10) r15 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="c4000000", @ANYRES16=r15, @ANYBLOB="110e00c0000000000000010000000000000001410000ff46001700000000000000003a000000"], 0xfffffffffffffe1b}}, 0x0) r16 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r16, &(0x7f00000003c0)=""/76, 0x25) fchdir(0xffffffffffffffff) fchdir(0xffffffffffffffff) r17 = open(&(0x7f0000000180)='./file1\x00', 0x0, 0x2d) fchdir(r17) r18 = open(&(0x7f0000000180)='./file1\x00', 0x0, 0x2d) fchdir(r18) mount$fuse(0x0, &(0x7f0000000740)='./file0/file0\x00', &(0x7f0000000940)='fuse\x00', 0x10000, &(0x7f00000007c0)=ANY=[@ANYRES64, @ANYBLOB="04873bbc295eb5ee35d4b40cdb6976a32c4a47de75a20ec8105c03763d67e93c0381c2a125fda9944956f46133213bfd68005d842ab6dae3498083084ce51e37974cd8d0d9d3744761eec34c1118a5a2dfbcace1db6d3e6007c2989ce9fff180ee287b69dba00dafe869731acde259d177774b0a25b37d16182289bcf1953da844ee1d1dd9078c5493cad7fb2e4ba2536ca1b98251301b0d0a2d034b21a79aae51f22da36ce7c3a7d85b20e844153808bc6ffff7c44eefa5425b7e1386a0547a4682b6178150af8177dc51a1022eaf94fb19e4775ca3393571f3f082f8944d11fe0fcc802f63eaf2a50a", @ANYRESDEC=0x0]) 03:43:13 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 258.852191] hfs: can't find a HFS filesystem on dev loop4 03:43:13 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe24"]) 03:43:13 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="080db5055e0bcfe8696071") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="40000037312444d4b08900100001080000000034530e00"/32, @ANYRES32=0x0, @ANYBLOB="000000000000000018001600140001001000050000000000000000000000000008001b0000000000"], 0x40}}, 0x0) [ 259.022825] hfs: type requires a 4 character value [ 259.053857] hfs: unable to parse mount options [ 259.066281] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9265 sclass=netlink_route_socket pig=10558 comm=syz-executor.0 03:43:13 executing program 2: syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x1, 0x10200) r0 = dup(0xffffffffffffffff) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000340), 0x4) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffb000/0x1000)=nil, 0x1000}, 0x2}) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) socket(0x8, 0x806, 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') write$binfmt_misc(r3, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x58) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xb) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7b, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000200)={r8, 0x58, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x39, @dev={0xfe, 0x80, [], 0xc}, 0x693bd245}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e22, 0xae7b, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2a}}, 0x8}, @in={0x2, 0x4e21, @local}]}, &(0x7f0000000240)=0x10) r9 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x2, 0x0, 0xfffffdac) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8642957429963afa, @perf_bp={0x0, 0x8}, 0x10080, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) fsetxattr(r10, &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f00000003c0)='threaded\x00', 0x9, 0x2) clone(0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="18f60a2111586ff65f2573aab50febd1d64fbb4158f63355602481443fece7a1f642d7754be2dbbcd0a5afdcf5e5f5fa7bac7fa790a735e74bb290d2ccdd91d9eacb6ed623261827e03be7b7622d9dabee3c4c88") 03:43:13 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:13 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='q']) 03:43:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) 03:43:13 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xf4a, 0x20000) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000500)=0x4dac) r1 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$set_timeout(0xf, r1, 0x100) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/nvram\x00', 0x44002, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x9c, 0x6, 0x0, 0x0, 0x0, 0x20, 0x40, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000400), 0x3}, 0x20, 0x2, 0x0, 0x0, 0x0, 0x5}, r3, 0x8, r4, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3, 0xfffffffc], [0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97], [0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x72e8]}, 0x45c) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r6, 0x4112, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) r8 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r9 = creat(&(0x7f0000000140)='./bus\x00', 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x28001) setsockopt$inet6_tcp_TCP_MD5SIG(r9, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e24, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "4115a9eb37858182f8d4263bb51a7b8b1dbf4e192dd7537027ccf3fbc946fdee340000000000000000aaa1acbf1d3bba4ca8f58969a0b2beaf3c134f7c060fd9a31245f40f4fa4d1a2688600"}, 0xd8) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) [ 259.264024] hfs: unable to parse mount options [ 259.268353] sd 0:0:1:0: [sg0] tag#2988 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 259.277447] sd 0:0:1:0: [sg0] tag#2988 CDB: Test Unit Ready [ 259.283289] sd 0:0:1:0: [sg0] tag#2988 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.292227] sd 0:0:1:0: [sg0] tag#2988 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.302743] sd 0:0:1:0: [sg0] tag#2988 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.311879] sd 0:0:1:0: [sg0] tag#2988 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.320990] sd 0:0:1:0: [sg0] tag#2988 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.329888] sd 0:0:1:0: [sg0] tag#2988 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.340065] sd 0:0:1:0: [sg0] tag#2988 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.348952] sd 0:0:1:0: [sg0] tag#2988 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.357872] sd 0:0:1:0: [sg0] tag#2988 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.366778] sd 0:0:1:0: [sg0] tag#2988 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.375708] sd 0:0:1:0: [sg0] tag#2988 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.384654] sd 0:0:1:0: [sg0] tag#2988 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.393586] sd 0:0:1:0: [sg0] tag#2988 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 259.402502] sd 0:0:1:0: [sg0] tag#2988 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:43:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:14 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 259.411421] sd 0:0:1:0: [sg0] tag#2988 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 03:43:14 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='q']) [ 259.687737] hfs: unable to parse mount options 03:43:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) getpid() getpid() sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x3, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)="14", 0x1, 0x0, &(0x7f0000000200)={0xa, 0x3, 0x0, @loopback}, 0x1c) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") shutdown(r0, 0x1) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000840)=0xffffffffffffffff, 0x12) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f00000005c0)={0x5, &(0x7f00000002c0)=""/213, &(0x7f0000000780)=[{0x80, 0xee, 0x8, &(0x7f00000003c0)=""/238}, {0x7, 0x40, 0x1, &(0x7f0000000200)=""/64}, {0x1ff, 0x7d, 0xf55, &(0x7f0000000640)=""/125}, {0x401, 0x39, 0x3, &(0x7f00000004c0)=""/57}, {0x1, 0x9b, 0x4, &(0x7f00000006c0)=""/155}]}) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$X25_QBITINCL(r7, 0x106, 0x1, &(0x7f0000000180), 0x4) write$P9_RVERSION(r4, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x15) write$P9_RAUTH(r4, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x70, 0x5}}, 0x14) write$P9_RGETATTR(r4, &(0x7f0000000500)={0xa0, 0x19, 0x1, {0x10c1, {}, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) 03:43:14 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='q']) 03:43:14 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) [ 260.112690] hfs: unable to parse mount options 03:43:15 executing program 2: syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x1, 0x10200) r0 = dup(0xffffffffffffffff) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000340), 0x4) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffb000/0x1000)=nil, 0x1000}, 0x2}) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) socket(0x8, 0x806, 0x0) symlinkat(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') write$binfmt_misc(r3, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x58) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xb) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7b, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000200)={r8, 0x58, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x39, @dev={0xfe, 0x80, [], 0xc}, 0x693bd245}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e22, 0xae7b, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2a}}, 0x8}, @in={0x2, 0x4e21, @local}]}, &(0x7f0000000240)=0x10) r9 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x2, 0x0, 0xfffffdac) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8642957429963afa, @perf_bp={0x0, 0x8}, 0x10080, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) fsetxattr(r10, &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f00000003c0)='threaded\x00', 0x9, 0x2) clone(0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="18f60a2111586ff65f2573aab50febd1d64fbb4158f63355602481443fece7a1f642d7754be2dbbcd0a5afdcf5e5f5fa7bac7fa790a735e74bb290d2ccdd91d9eacb6ed623261827e03be7b7622d9dabee3c4c88") 03:43:15 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='quiet,t']) 03:43:15 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) [ 260.501830] hfs: unable to parse mount options [ 260.584822] sd 0:0:1:0: [sg0] tag#2987 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 260.593902] sd 0:0:1:0: [sg0] tag#2987 CDB: Test Unit Ready [ 260.599776] sd 0:0:1:0: [sg0] tag#2987 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.608823] sd 0:0:1:0: [sg0] tag#2987 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.617773] sd 0:0:1:0: [sg0] tag#2987 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:43:15 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='quiet,t']) 03:43:15 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) [ 260.626724] sd 0:0:1:0: [sg0] tag#2987 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.635709] sd 0:0:1:0: [sg0] tag#2987 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.644657] sd 0:0:1:0: [sg0] tag#2987 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.653753] sd 0:0:1:0: [sg0] tag#2987 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.662874] sd 0:0:1:0: [sg0] tag#2987 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.671951] sd 0:0:1:0: [sg0] tag#2987 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.681394] sd 0:0:1:0: [sg0] tag#2987 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.690460] sd 0:0:1:0: [sg0] tag#2987 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.699473] sd 0:0:1:0: [sg0] tag#2987 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.708677] sd 0:0:1:0: [sg0] tag#2987 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.717793] sd 0:0:1:0: [sg0] tag#2987 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.726866] sd 0:0:1:0: [sg0] tag#2987 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 260.930550] hfs: unable to parse mount options 03:43:15 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) 03:43:15 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='quiet,t']) 03:43:15 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}], 0x2, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) [ 261.367651] hfs: unable to parse mount options 03:43:16 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='quiet,type']) [ 261.547839] hfs: unable to parse mount options 03:43:16 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='quiet,type']) 03:43:16 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}], 0x2, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf27d79e1bb47d413, @perf_bp={&(0x7f0000000140)}, 0x1, 0x0, 0x0, 0x8}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) mount$9p_xen(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x10000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x1000000fa) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x30) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xcf5) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r5 = open(0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) dup3(0xffffffffffffffff, r6, 0x0) open(0x0, 0x800, 0x53de55d2de418623) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) dup2(0xffffffffffffffff, r7) open(0x0, 0x82040, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r10, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r10, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$KVM_SET_MP_STATE(r10, 0x4004ae99, &(0x7f0000000180)=0x7) ioctl$KVM_RUN(r10, 0xae80, 0x0) renameat(0xffffffffffffffff, &(0x7f00000003c0)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file0/f.le.\x00') 03:43:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000007c0)=ANY=[]) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) [ 261.832800] hfs: unable to parse mount options 03:43:16 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='quiet,type']) 03:43:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) 03:43:16 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}], 0x2, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 261.948944] audit: type=1800 audit(1578800596.528:79): pid=10718 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16901 res=0 [ 261.963517] hfs: unable to parse mount options 03:43:16 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:16 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 262.310297] audit: type=1804 audit(1578800596.568:80): pid=10727 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir806513644/syzkaller.UchjYg/47/file0" dev="sda1" ino=16901 res=1 [ 262.425751] hfs: type requires a 4 character value 03:43:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf27d79e1bb47d413, @perf_bp={&(0x7f0000000140)}, 0x1, 0x0, 0x0, 0x8}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) mount$9p_xen(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x10000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x1000000fa) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x30) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xcf5) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r5 = open(0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) dup3(0xffffffffffffffff, r6, 0x0) open(0x0, 0x800, 0x53de55d2de418623) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) dup2(0xffffffffffffffff, r7) open(0x0, 0x82040, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r10, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r10, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$KVM_SET_MP_STATE(r10, 0x4004ae99, &(0x7f0000000180)=0x7) ioctl$KVM_RUN(r10, 0xae80, 0x0) renameat(0xffffffffffffffff, &(0x7f00000003c0)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file0/f.le.\x00') [ 262.456159] hfs: unable to parse mount options 03:43:17 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='quiet,type=']) [ 262.645082] audit: type=1804 audit(1578800597.238:81): pid=10771 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir806513644/syzkaller.UchjYg/48/file0" dev="sda1" ino=16523 res=1 03:43:17 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{0x0, 0x0, 0x0}, 0x6}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) [ 262.800848] hfs: unable to parse mount options [ 262.805835] audit: type=1800 audit(1578800597.278:82): pid=10766 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16523 res=0 03:43:17 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='quiet,type=']) 03:43:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) [ 262.969882] hfs: unable to parse mount options 03:43:17 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='quiet,type=']) 03:43:17 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{0x0, 0x0, 0x0}}], 0x3, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) [ 263.354539] hfs: unable to parse mount options 03:43:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf27d79e1bb47d413, @perf_bp={&(0x7f0000000140)}, 0x1, 0x0, 0x0, 0x8}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) mount$9p_xen(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x10000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x1000000fa) r2 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x30) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0xcf5) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r5 = open(0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) dup3(0xffffffffffffffff, r6, 0x0) open(0x0, 0x800, 0x53de55d2de418623) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) dup2(0xffffffffffffffff, r7) open(0x0, 0x82040, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r10, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r10, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$KVM_SET_MP_STATE(r10, 0x4004ae99, &(0x7f0000000180)=0x7) ioctl$KVM_RUN(r10, 0xae80, 0x0) renameat(0xffffffffffffffff, &(0x7f00000003c0)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file0/f.le.\x00') 03:43:18 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:18 executing program 4 (fault-call:2 fault-nth:0): r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) [ 263.713396] audit: type=1800 audit(1578800598.298:83): pid=10822 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16904 res=0 [ 263.752425] FAULT_INJECTION: forcing a failure. [ 263.752425] name failslab, interval 1, probability 0, space 0, times 1 03:43:18 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)={0x2, 0x0, [{0x10000, 0x3f, &(0x7f0000000040)=""/63}, {0x6000, 0xc1, &(0x7f0000000100)=""/193}]}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000080), &(0x7f0000000280)=0x4) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)="390000001300250069000007a2e407edab1d0558100000003e038107a2770e1419000a0010000000000003f5000000000000ef38bf461e59d7", 0x330}], 0x1) [ 263.829566] audit: type=1804 audit(1578800598.308:84): pid=10822 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir806513644/syzkaller.UchjYg/49/file0" dev="sda1" ino=16904 res=1 [ 263.846411] CPU: 1 PID: 10832 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 [ 263.864669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.874032] Call Trace: [ 263.876741] dump_stack+0x142/0x197 [ 263.879488] device team0 entered promiscuous mode [ 263.880454] should_fail.cold+0x10f/0x159 [ 263.880527] should_failslab+0xdb/0x130 [ 263.880539] __kmalloc+0x2f0/0x7a0 [ 263.886467] device team_slave_0 entered promiscuous mode [ 263.889596] ? __sb_end_write+0xc1/0x100 [ 263.889610] ? strnlen_user+0x12f/0x1a0 [ 263.902378] device team_slave_1 entered promiscuous mode [ 263.902804] ? SyS_memfd_create+0xba/0x3a0 [ 263.902819] SyS_memfd_create+0xba/0x3a0 [ 263.915032] team0: Cannot enslave team device to itself [ 263.916298] ? shmem_fcntl+0x130/0x130 [ 263.916311] ? do_syscall_64+0x53/0x640 [ 263.916323] ? shmem_fcntl+0x130/0x130 [ 263.916336] do_syscall_64+0x1e8/0x640 [ 263.916345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.916451] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 263.924647] team0: Cannot enslave team device to itself [ 263.924668] RIP: 0033:0x45af49 [ 263.964359] RSP: 002b:00007f1983ea7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 263.972074] RAX: ffffffffffffffda RBX: 00007f1983ea7c90 RCX: 000000000045af49 03:43:18 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 263.979349] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 263.986723] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 263.994007] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1983ea86d4 [ 264.001644] R13: 00000000004cbe0f R14: 00000000004e6aa0 R15: 0000000000000004 03:43:18 executing program 4 (fault-call:2 fault-nth:1): r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:18 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r3) r4 = add_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="327efa5aa2469e6b3f422cd514a17b87ca2d5eb0250c66eb34ca4e8f2b92915b746c5cba83d56862753faeea96b675c52e867b09fb7bdfc73596773efce7e4f9f3abf15e60e42118d2c58d26b3ebe234d81dc0d47220783e3eaec3ffd5696b717288d7a7849e1d4649677e248404f33ce69b8bc5bb867d89d55ff7919f7322a9bc189fc7670b9e43633821e58ea18ee8f1434b6ea2fc4c8b64686141547249d318296254808af60154f8bdab2c5af399281b88552af054c6de5a6f0ce5bc4120b0bbc33e3fb9f984f9fe7547a60cfb315712bb06237dc452c60c222add4fd4585fa73923ae9ada21c4b6989e5f7e8f", 0xef, r3) keyctl$get_persistent(0x16, r1, r4) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create1(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000080)=0xa, 0x4) r6 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r6, 0x80044d76, &(0x7f0000000140)) ioctl$SOUND_PCM_READ_RATE(r6, 0x80045002, &(0x7f0000000000)) socket$inet_dccp(0x2, 0x6, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000100)={0x401, 0x20, 0xdd, 0x239, 0x9, 0xfff, 0x100000001, 0x3}, &(0x7f0000000280)={0x80000000, 0x3, 0x20, 0xffffffffffffff80, 0x2, 0x100000001, 0x8, 0x2}, &(0x7f00000002c0)={0x800, 0x1, 0x8000, 0x6, 0x9, 0x6, 0x101, 0x2430}, &(0x7f0000000340), &(0x7f00000003c0)={&(0x7f0000000380)={0x40}, 0x8}) clock_settime(0x1, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000800)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x6}, &(0x7f0000000200)={0x0, r7+30000000}, 0x0) 03:43:18 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 264.242293] FAULT_INJECTION: forcing a failure. [ 264.242293] name failslab, interval 1, probability 0, space 0, times 0 03:43:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) [ 264.342306] CPU: 0 PID: 10861 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 [ 264.350257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.359626] Call Trace: [ 264.362232] dump_stack+0x142/0x197 [ 264.365946] should_fail.cold+0x10f/0x159 [ 264.370118] should_failslab+0xdb/0x130 [ 264.374286] kmem_cache_alloc+0x2d7/0x780 [ 264.378435] ? retint_kernel+0x2d/0x2d [ 264.382366] __d_alloc+0x2d/0x9f0 [ 264.385837] d_alloc_pseudo+0x1e/0x30 [ 264.389651] __shmem_file_setup.part.0+0xd8/0x400 [ 264.394503] ? __alloc_fd+0x1d4/0x4a0 [ 264.398324] ? shmem_fill_super+0x8c0/0x8c0 [ 264.402691] SyS_memfd_create+0x1f9/0x3a0 [ 264.406854] ? shmem_fcntl+0x130/0x130 [ 264.410749] ? do_syscall_64+0x53/0x640 [ 264.414731] ? shmem_fcntl+0x130/0x130 [ 264.418625] do_syscall_64+0x1e8/0x640 [ 264.422518] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.427371] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 264.432559] RIP: 0033:0x45af49 03:43:19 executing program 4 (fault-call:2 fault-nth:2): r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) [ 264.435747] RSP: 002b:00007f1983e86a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 264.443457] RAX: ffffffffffffffda RBX: 00007f1983e86c90 RCX: 000000000045af49 [ 264.450735] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 264.458056] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000001 [ 264.465443] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1983e876d4 [ 264.472752] R13: 00000000004cbe0f R14: 00000000004e6aa0 R15: 0000000000000003 03:43:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) 03:43:19 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 264.778973] FAULT_INJECTION: forcing a failure. [ 264.778973] name failslab, interval 1, probability 0, space 0, times 0 [ 264.819395] CPU: 0 PID: 10885 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 [ 264.828892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.838264] Call Trace: [ 264.840966] dump_stack+0x142/0x197 [ 264.844619] should_fail.cold+0x10f/0x159 [ 264.848774] should_failslab+0xdb/0x130 [ 264.853715] kmem_cache_alloc+0x2d7/0x780 [ 264.857959] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 264.863465] ? rcu_read_lock_sched_held+0x110/0x130 [ 264.868480] ? shmem_destroy_callback+0xa0/0xa0 [ 264.873147] shmem_alloc_inode+0x1c/0x50 [ 264.877204] alloc_inode+0x64/0x180 [ 264.880844] new_inode_pseudo+0x19/0xf0 [ 264.884830] new_inode+0x1f/0x40 [ 264.888230] shmem_get_inode+0x75/0x750 [ 264.892239] __shmem_file_setup.part.0+0x111/0x400 [ 264.897219] ? __alloc_fd+0x1d4/0x4a0 [ 264.901016] ? shmem_fill_super+0x8c0/0x8c0 [ 264.905358] SyS_memfd_create+0x1f9/0x3a0 [ 264.909506] ? shmem_fcntl+0x130/0x130 [ 264.913442] ? do_syscall_64+0x53/0x640 [ 264.917519] ? shmem_fcntl+0x130/0x130 [ 264.921406] do_syscall_64+0x1e8/0x640 [ 264.925296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.930140] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 264.935425] RIP: 0033:0x45af49 [ 264.938614] RSP: 002b:00007f1983ea7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 264.946314] RAX: ffffffffffffffda RBX: 00007f1983ea7c90 RCX: 000000000045af49 [ 264.953605] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 264.961014] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 264.968312] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1983ea86d4 [ 264.975591] R13: 00000000004cbe0f R14: 00000000004e6aa0 R15: 0000000000000004 03:43:19 executing program 4 (fault-call:2 fault-nth:3): r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r9, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r8, r9, 0x0) 03:43:19 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:19 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r3) r4 = add_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="327efa5aa2469e6b3f422cd514a17b87ca2d5eb0250c66eb34ca4e8f2b92915b746c5cba83d56862753faeea96b675c52e867b09fb7bdfc73596773efce7e4f9f3abf15e60e42118d2c58d26b3ebe234d81dc0d47220783e3eaec3ffd5696b717288d7a7849e1d4649677e248404f33ce69b8bc5bb867d89d55ff7919f7322a9bc189fc7670b9e43633821e58ea18ee8f1434b6ea2fc4c8b64686141547249d318296254808af60154f8bdab2c5af399281b88552af054c6de5a6f0ce5bc4120b0bbc33e3fb9f984f9fe7547a60cfb315712bb06237dc452c60c222add4fd4585fa73923ae9ada21c4b6989e5f7e8f", 0xef, r3) keyctl$get_persistent(0x16, r1, r4) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create1(0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000080)=0xa, 0x4) r6 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r6, 0x80044d76, &(0x7f0000000140)) ioctl$SOUND_PCM_READ_RATE(r6, 0x80045002, &(0x7f0000000000)) socket$inet_dccp(0x2, 0x6, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000100)={0x401, 0x20, 0xdd, 0x239, 0x9, 0xfff, 0x100000001, 0x3}, &(0x7f0000000280)={0x80000000, 0x3, 0x20, 0xffffffffffffff80, 0x2, 0x100000001, 0x8, 0x2}, &(0x7f00000002c0)={0x800, 0x1, 0x8000, 0x6, 0x9, 0x6, 0x101, 0x2430}, &(0x7f0000000340), &(0x7f00000003c0)={&(0x7f0000000380)={0x40}, 0x8}) clock_settime(0x1, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000800)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x6}, &(0x7f0000000200)={0x0, r7+30000000}, 0x0) 03:43:19 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r4 = openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000340)) io_setup(0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) [ 265.223946] FAULT_INJECTION: forcing a failure. [ 265.223946] name failslab, interval 1, probability 0, space 0, times 0 [ 265.267928] CPU: 0 PID: 10901 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 [ 265.275864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.285230] Call Trace: [ 265.287829] dump_stack+0x142/0x197 [ 265.291469] should_fail.cold+0x10f/0x159 [ 265.295636] should_failslab+0xdb/0x130 [ 265.299631] kmem_cache_alloc+0x2d7/0x780 [ 265.303790] ? shmem_alloc_inode+0x1c/0x50 [ 265.308037] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 265.313580] selinux_inode_alloc_security+0xb6/0x2a0 [ 265.318761] security_inode_alloc+0x94/0xd0 [ 265.323187] inode_init_always+0x552/0xaf0 [ 265.327434] alloc_inode+0x81/0x180 [ 265.331071] new_inode_pseudo+0x19/0xf0 [ 265.335049] new_inode+0x1f/0x40 [ 265.338416] shmem_get_inode+0x75/0x750 [ 265.342394] __shmem_file_setup.part.0+0x111/0x400 [ 265.347323] ? __alloc_fd+0x1d4/0x4a0 [ 265.351124] ? shmem_fill_super+0x8c0/0x8c0 [ 265.355452] SyS_memfd_create+0x1f9/0x3a0 [ 265.359584] ? shmem_fcntl+0x130/0x130 [ 265.363455] ? do_syscall_64+0x53/0x640 [ 265.367415] ? shmem_fcntl+0x130/0x130 [ 265.371285] do_syscall_64+0x1e8/0x640 [ 265.375161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.379993] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 265.385178] RIP: 0033:0x45af49 [ 265.388355] RSP: 002b:00007f1983ea7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 265.396404] RAX: ffffffffffffffda RBX: 00007f1983ea7c90 RCX: 000000000045af49 [ 265.403683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 265.410959] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 03:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x54380, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@dev}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000180)) clock_getres(0x7, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_IOCTL(r4, &(0x7f00000002c0)={0x20, 0x0, 0x5, {0x0, 0x0, 0x2, 0x3}}, 0x20) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b643a3abd3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1002000000013) 03:43:20 executing program 4 (fault-call:2 fault-nth:4): r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) [ 265.418230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1983ea86d4 [ 265.425491] R13: 00000000004cbe0f R14: 00000000004e6aa0 R15: 0000000000000004 [ 265.478633] FAULT_INJECTION: forcing a failure. [ 265.478633] name failslab, interval 1, probability 0, space 0, times 0 [ 265.495007] CPU: 1 PID: 10917 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 [ 265.502964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.512318] Call Trace: [ 265.514919] dump_stack+0x142/0x197 [ 265.518551] should_fail.cold+0x10f/0x159 [ 265.522706] should_failslab+0xdb/0x130 [ 265.526692] kmem_cache_alloc+0x2d7/0x780 [ 265.530885] ? lock_downgrade+0x740/0x740 [ 265.533507] libceph: resolve 'd' (ret=-3): failed [ 265.535051] get_empty_filp+0x8c/0x3f0 [ 265.535064] alloc_file+0x23/0x440 [ 265.535081] __shmem_file_setup.part.0+0x1b1/0x400 [ 265.535092] ? __alloc_fd+0x1d4/0x4a0 [ 265.535103] ? shmem_fill_super+0x8c0/0x8c0 [ 265.535123] SyS_memfd_create+0x1f9/0x3a0 [ 265.540218] libceph: parse_ips bad ip '[d::½' [ 265.543846] ? shmem_fcntl+0x130/0x130 [ 265.543858] ? do_syscall_64+0x53/0x640 [ 265.543869] ? shmem_fcntl+0x130/0x130 [ 265.543882] do_syscall_64+0x1e8/0x640 [ 265.543893] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.543912] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 265.543920] RIP: 0033:0x45af49 [ 265.543926] RSP: 002b:00007f1983ea7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 265.543939] RAX: ffffffffffffffda RBX: 00007f1983ea7c90 RCX: 000000000045af49 [ 265.543945] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 265.543950] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 03:43:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) [ 265.543963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1983ea86d4 [ 265.634959] R13: 00000000004cbe0f R14: 00000000004e6aa0 R15: 0000000000000004 03:43:20 executing program 4 (fault-call:2 fault-nth:5): r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:20 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r5, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r6 = socket$inet6(0xa, 0x1, 0x0) dup2(r6, r5) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 265.935846] FAULT_INJECTION: forcing a failure. [ 265.935846] name failslab, interval 1, probability 0, space 0, times 0 [ 265.954763] CPU: 0 PID: 10938 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 [ 265.962801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.972171] Call Trace: [ 265.974770] dump_stack+0x142/0x197 [ 265.978404] should_fail.cold+0x10f/0x159 [ 265.982559] should_failslab+0xdb/0x130 [ 265.986696] kmem_cache_alloc+0x2d7/0x780 [ 265.990834] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 265.996340] ? check_preemption_disabled+0x3c/0x250 [ 266.002132] selinux_file_alloc_security+0xb4/0x190 [ 266.007146] security_file_alloc+0x6d/0xa0 [ 266.011378] get_empty_filp+0x162/0x3f0 [ 266.015349] alloc_file+0x23/0x440 [ 266.018882] __shmem_file_setup.part.0+0x1b1/0x400 [ 266.023807] ? __alloc_fd+0x1d4/0x4a0 [ 266.027620] ? shmem_fill_super+0x8c0/0x8c0 [ 266.031936] SyS_memfd_create+0x1f9/0x3a0 [ 266.036078] ? shmem_fcntl+0x130/0x130 [ 266.039964] ? do_syscall_64+0x53/0x640 [ 266.043944] ? shmem_fcntl+0x130/0x130 [ 266.047841] do_syscall_64+0x1e8/0x640 [ 266.051725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.056575] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 266.061772] RIP: 0033:0x45af49 [ 266.064947] RSP: 002b:00007f1983ea7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 266.072844] RAX: ffffffffffffffda RBX: 00007f1983ea7c90 RCX: 000000000045af49 03:43:20 executing program 4 (fault-call:2 fault-nth:6): r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) [ 266.080113] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bfff2 [ 266.087389] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000001 [ 266.094655] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1983ea86d4 [ 266.101911] R13: 00000000004cbe0f R14: 00000000004e6aa0 R15: 0000000000000004 03:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r0, 0x0, r0) io_submit(0x0, 0xfc5f, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x4352}], 0x1}, 0x2000) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c77c0646e6f3d", @ANYRESHEX=r1, @ANYBLOB=',access=client,msize=0x000000000000003f,access=', @ANYRESDEC=r4, @ANYBLOB="2c616669643d3078303030303030303030303030303030392c76657273696f6e3d3970323030302c7365636c6162656c2c736d61636b6673726f6f743d656d31736563757269747975736572706f7369785f61636c5f616363657373656d302c736d61636b6673726f6f743d6367726f75702c6d61736b3d4d41595f57524954452c646f6e745f686173682c646566636f6e746578743d73797374656d5f752c736d61636b66736861743d6574683124a72c626465762c66756e633d4d4f44554c455f434845434b2c66736e616d653d402d766d6e6574302a2c262c00"]) 03:43:20 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r5, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r6 = socket$inet6(0xa, 0x1, 0x0) dup2(r6, r5) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) openat$vsock(0xffffffffffffff9c, 0x0, 0xb4cb88652fa0bab, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) [ 266.208005] FAULT_INJECTION: forcing a failure. [ 266.208005] name failslab, interval 1, probability 0, space 0, times 0 [ 266.231322] CPU: 0 PID: 10951 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 [ 266.239255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.248615] Call Trace: [ 266.251217] dump_stack+0x142/0x197 [ 266.254861] should_fail.cold+0x10f/0x159 [ 266.259023] should_failslab+0xdb/0x130 [ 266.263004] kmem_cache_alloc+0x2d7/0x780 [ 266.267239] ? do_sys_ftruncate.constprop.0+0x35c/0x490 [ 266.272619] getname_flags+0xcb/0x580 [ 266.276436] getname+0x1a/0x20 [ 266.279636] do_sys_open+0x1e7/0x430 [ 266.283362] ? filp_open+0x70/0x70 [ 266.286913] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 266.292286] SyS_open+0x2d/0x40 [ 266.295566] ? do_sys_open+0x430/0x430 [ 266.299459] do_syscall_64+0x1e8/0x640 [ 266.303353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.308215] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 266.313496] RIP: 0033:0x414ce1 [ 266.316693] RSP: 002b:00007f1983ea7a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 266.324409] RAX: ffffffffffffffda RBX: 00007f1983ea7c90 RCX: 0000000000414ce1 [ 266.331705] RDX: 00007f1983ea7b0a RSI: 0000000000000002 RDI: 00007f1983ea7b00 [ 266.338981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 266.346258] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f1983ea86d4 03:43:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40085112, &(0x7f0000000180)={{0x7fffffff, 0x9}, {}, 0x0, 0x7, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 03:43:20 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0xfffffffe]}, 0x45c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$TIPC_CONN_TIMEOUT(r4, 0x10f, 0x82, &(0x7f0000000000)=0x233, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0xc00, 0x0) connect$nfc_raw(r6, &(0x7f00000000c0)={0x27, 0x1, 0x2, 0x2}, 0x10) fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) r8 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r8, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$FS_IOC_FIEMAP(r8, 0xc020660b, &(0x7f0000000100)={0xa84b, 0x5, 0x0, 0x7, 0x4, [{0x1c46, 0x8, 0x400, [], 0x400}, {0xffffffffffffffdc, 0x2, 0x1, [], 0x408}, {0x80000000, 0x81, 0x96, [], 0x800}, {0x2, 0x100000001, 0xbc, [], 0x2000}]}) 03:43:20 executing program 4 (fault-call:2 fault-nth:7): r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) [ 266.353537] R13: 00000000004cbe0f R14: 00000000004e6aa0 R15: 0000000000000004 [ 266.466309] FAULT_INJECTION: forcing a failure. [ 266.466309] name failslab, interval 1, probability 0, space 0, times 0 [ 266.491119] CPU: 0 PID: 10972 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 [ 266.499050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.508521] Call Trace: [ 266.511127] dump_stack+0x142/0x197 [ 266.514779] should_fail.cold+0x10f/0x159 [ 266.518952] should_failslab+0xdb/0x130 [ 266.522954] kmem_cache_alloc+0x2d7/0x780 [ 266.527113] ? save_stack+0xa9/0xd0 [ 266.530754] get_empty_filp+0x8c/0x3f0 [ 266.534653] path_openat+0x8f/0x3f70 [ 266.538380] ? trace_hardirqs_on+0x10/0x10 [ 266.542638] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 266.547306] ? save_trace+0x290/0x290 [ 266.551113] ? __alloc_fd+0x1d4/0x4a0 [ 266.554927] do_filp_open+0x18e/0x250 [ 266.558746] ? may_open_dev+0xe0/0xe0 [ 266.563063] ? lock_downgrade+0x740/0x740 [ 266.567280] ? do_raw_spin_unlock+0x16b/0x260 [ 266.571777] ? _raw_spin_unlock+0x2d/0x50 [ 266.575935] ? __alloc_fd+0x1d4/0x4a0 [ 266.579737] do_sys_open+0x2c5/0x430 [ 266.583452] ? filp_open+0x70/0x70 [ 266.587022] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 266.592373] SyS_open+0x2d/0x40 [ 266.595645] ? do_sys_open+0x430/0x430 [ 266.599528] do_syscall_64+0x1e8/0x640 [ 266.603403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.608234] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 266.613404] RIP: 0033:0x414ce1 [ 266.616576] RSP: 002b:00007f1983ea7a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 266.624276] RAX: ffffffffffffffda RBX: 00007f1983ea7c90 RCX: 0000000000414ce1 [ 266.631552] RDX: 00007f1983ea7b0a RSI: 0000000000000002 RDI: 00007f1983ea7b00 [ 266.638813] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 266.646128] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f1983ea86d4 [ 266.653436] R13: 00000000004cbe0f R14: 00000000004e6aa0 R15: 0000000000000004 03:43:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) socket(0xa265651206979840, 0x2, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_pts(r2, 0x2180) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0xc0000, 0x0) ioctl$SNDCTL_DSP_SYNC(r5, 0x5001, 0x0) ioctl$NBD_SET_SIZE(r4, 0xab02, 0x4) setreuid(0x0, r3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x60002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_init_net_socket$ax25(0x3, 0xc1dcf435dadc57e7, 0xcf) getsockopt(r9, 0x3ff, 0x5, &(0x7f0000000280)=""/71, &(0x7f0000000180)=0x47) renameat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r8, &(0x7f0000000100)='./file0\x00') ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x14) 03:43:23 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r5, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r6 = socket$inet6(0xa, 0x1, 0x0) dup2(r6, r5) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:23 executing program 4 (fault-call:2 fault-nth:8): r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) 03:43:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$FUSE_NOTIFY_STORE(r7, &(0x7f00000002c0)=ANY=[@ANYBLOB="2d0000000400000000000000000000000200010000000000070000000000000005000000000000000000000000bad371338a6d029c1f75fa4e97a37c6e57835c9b77f18c60b86bd73bc6b26f095a1866e4a064c0bfa68e5073e1bfafb1f60fb92cf502da79ea84b89cc0d6e611660eb20400"/130], 0x2d) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x101042, 0x0) getsockopt$inet_mreqsrc(r8, 0x0, 0x28, &(0x7f0000000400)={@empty, @loopback, @local}, &(0x7f0000000440)=0xc) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) mq_timedreceive(r7, &(0x7f0000000180)=""/169, 0xa9, 0x4, &(0x7f0000000280)) close(r0) [ 268.582237] FAULT_INJECTION: forcing a failure. [ 268.582237] name failslab, interval 1, probability 0, space 0, times 0 [ 268.605493] CPU: 0 PID: 10986 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 [ 268.613409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.622775] Call Trace: [ 268.625381] dump_stack+0x142/0x197 [ 268.629049] should_fail.cold+0x10f/0x159 [ 268.633237] should_failslab+0xdb/0x130 [ 268.637226] kmem_cache_alloc+0x2d7/0x780 [ 268.641512] ? save_stack+0xa9/0xd0 [ 268.645161] get_empty_filp+0x8c/0x3f0 [ 268.649340] path_openat+0x8f/0x3f70 [ 268.653103] ? trace_hardirqs_on+0x10/0x10 [ 268.657371] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 268.662068] ? save_trace+0x290/0x290 [ 268.665887] ? __alloc_fd+0x1d4/0x4a0 [ 268.669709] do_filp_open+0x18e/0x250 [ 268.673525] ? may_open_dev+0xe0/0xe0 [ 268.677366] ? lock_downgrade+0x740/0x740 [ 268.681785] ? do_raw_spin_unlock+0x16b/0x260 [ 268.686289] ? _raw_spin_unlock+0x2d/0x50 [ 268.690449] ? __alloc_fd+0x1d4/0x4a0 [ 268.694274] do_sys_open+0x2c5/0x430 [ 268.698001] ? filp_open+0x70/0x70 [ 268.701559] ? do_sys_ftruncate.constprop.0+0x370/0x490 [ 268.706935] SyS_open+0x2d/0x40 [ 268.710222] ? do_sys_open+0x430/0x430 [ 268.714121] do_syscall_64+0x1e8/0x640 [ 268.718013] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.722874] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.728065] RIP: 0033:0x414ce1 [ 268.731259] RSP: 002b:00007f1983ea7a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 268.738976] RAX: ffffffffffffffda RBX: 00007f1983ea7c90 RCX: 0000000000414ce1 [ 268.746250] RDX: 00007f1983ea7b0a RSI: 0000000000000002 RDI: 00007f1983ea7b00 [ 268.753524] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 268.760811] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f1983ea86d4 [ 268.768435] R13: 00000000004cbe0f R14: 00000000004e6aa0 R15: 0000000000000004 03:43:23 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:23 executing program 0: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xfe, 0x1f, 0x0, 0xff, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpu.stat\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x18a41010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r5, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xca5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x2001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f080351fffffff000a4000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1074425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) socket$kcm(0xa, 0x5, 0x0) 03:43:23 executing program 4 (fault-call:2 fault-nth:9): r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xe, 0x380, &(0x7f0000000340)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000055040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d6683ccce093c37fd5034f9d3b5cfd122507000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae25c3d1a1fbe96dd87235b44174f7c03431"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) set_mempolicy(0x8000, &(0x7f00000001c0)=0x3, 0x9) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000140)="73844ae89d", 0x5}]) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r3, &(0x7f0000000140)="73844ae89d", 0x5}]) io_getevents(r2, 0x2, 0x0, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}], 0x0) [ 269.145353] FAULT_INJECTION: forcing a failure. [ 269.145353] name failslab, interval 1, probability 0, space 0, times 0 03:43:23 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 269.220739] CPU: 0 PID: 11031 Comm: syz-executor.4 Not tainted 4.14.163-syzkaller #0 [ 269.228687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.238051] Call Trace: [ 269.240658] dump_stack+0x142/0x197 [ 269.244311] should_fail.cold+0x10f/0x159 [ 269.248477] should_failslab+0xdb/0x130 [ 269.252469] kmem_cache_alloc+0x2d7/0x780 [ 269.256629] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 269.262100] ? check_preemption_disabled+0x3c/0x250 [ 269.267134] selinux_file_alloc_security+0xb4/0x190 [ 269.272165] security_file_alloc+0x6d/0xa0 [ 269.276419] get_empty_filp+0x162/0x3f0 [ 269.280409] path_openat+0x8f/0x3f70 [ 269.284137] ? trace_hardirqs_on+0x10/0x10 [ 269.288401] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 269.293083] ? save_trace+0x290/0x290 [ 269.296897] ? __alloc_fd+0x1d4/0x4a0 [ 269.300740] do_filp_open+0x18e/0x250 [ 269.304561] ? may_open_dev+0xe0/0xe0 [ 269.308379] ? lock_downgrade+0x740/0x740 [ 269.312542] ? do_raw_spin_unlock+0x16b/0x260 [ 269.317048] ? _raw_spin_unlock+0x2d/0x50 [ 269.321209] ? __alloc_fd+0x1d4/0x4a0 [ 269.325034] do_sys_open+0x2c5/0x430 [ 269.328764] ? filp_open+0x70/0x70 [ 269.332328] SyS_open+0x2d/0x40 [ 269.335619] ? do_sys_open+0x430/0x430 [ 269.339687] do_syscall_64+0x1e8/0x640 [ 269.343845] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.348706] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.353927] RIP: 0033:0x414ce1 [ 269.357126] RSP: 002b:00007f1983ea7a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 03:43:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) [ 269.364850] RAX: ffffffffffffffda RBX: 00007f1983ea7c90 RCX: 0000000000414ce1 [ 269.372126] RDX: 00007f1983ea7b0a RSI: 0000000000000002 RDI: 00007f1983ea7b00 [ 269.379408] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 269.386693] R10: 0000000000000075 R11: 0000000000000293 R12: 00007f1983ea86d4 [ 269.393972] R13: 00000000004cbe0f R14: 00000000004e6aa0 R15: 0000000000000004 03:43:24 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r2, 0x208200) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) 03:43:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:24 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:24 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x4000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x0, 0x3f, 0x1f, 0x0, 0x3ff, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x5, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={0x1, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000040)=0x2f) openat$cgroup_subtree(r4, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d65ef0b007c05e8fe55a10a000500ac14142603000e1208001e000000812fa800040008000300e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x159, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008104e00f80ecdb4cb902020000040e000000810040fb12000100040fda1b40d819a906000500000f", 0x33fe0}], 0x1, 0x0, 0x0, 0x10}, 0x0) 03:43:24 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffffe4d6172f05ffffa6fffff7", @ANYRES32, @ANYBLOB="00000000ffffffff"], 0x3}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x2d4) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r6, 0x103, 0x6, &(0x7f0000000100), 0x4) r7 = fcntl$dupfd(r5, 0x203, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="d00800002600ffac68ebf10add6c6c7cc1b4710000000000000000000000000018a2ffcb731710a11d0ceb0297142f3b8feda72ecaae49ab76f3a2edca783cc29afcf678c08ab3dfa8c8b19ef7bd735ec44f910ee639ec792b69416634b142f20861fc335fd73363334635d3666d29dd55b4db9f2f4b495cfc96480a4ff0c93aa75c0fc984b37f890462b57f82f02caddb0531c8ac77176fba191955b4ee83857475e7dda739a7c1ce7c65976434b19be8900b97db2c584851aeabf198fc19bcc7a47f7cbf4654d7ef770e9888ce9cc15900d9c8866c64462d6a31f98764279da2cdb92db5", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:43:24 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 269.979389] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11074 comm=syz-executor.2 03:43:24 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="7175e882e259d48c8c6c1f6a"]) [ 270.023698] netlink: 2220 bytes leftover after parsing attributes in process `syz-executor.2'. 03:43:24 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 270.117885] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11074 comm=syz-executor.2 03:43:24 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x4000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x0, 0x3f, 0x1f, 0x0, 0x3ff, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x5, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={0x1, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000040)=0x2f) openat$cgroup_subtree(r4, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d65ef0b007c05e8fe55a10a000500ac14142603000e1208001e000000812fa800040008000300e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x159, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008104e00f80ecdb4cb902020000040e000000810040fb12000100040fda1b40d819a906000500000f", 0x33fe0}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 270.186314] hfs: unable to parse mount options [ 270.193934] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11074 comm=syz-executor.2 03:43:24 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 270.248174] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11074 comm=syz-executor.2 03:43:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) pipe(&(0x7f0000000200)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r5, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r6 = socket$inet6(0xa, 0x1, 0x0) dup2(r6, r5) [ 270.306193] hfs: unable to parse mount options [ 270.307990] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11074 comm=syz-executor.2 03:43:24 executing program 4: r0 = socket(0x26, 0x4, 0x7f) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"]) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x10000, 0x0) unlink(&(0x7f0000001280)='./file0\x00') ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000001240)={0x1, 0xffffffffffffffff, 0x1}) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="08100000ff0f00006589c90065c81423985cce1e2f6d861fcb10e6e65078291514ffcf2d0fde2491f8024adb105979a116d047adf8445924441b471a3cdef2bb50616d726e6ffefc67d702d82a34d4e4eeae18063ea49b9936b9cf8550439def383c1524ad2fdd257487842a4bfcaedd6c3d8189391e336ff3c79de210ccf40777b027cbbf0c780b0dd53b49007b967bfdf8d42dfb21475b2ce68d3ff0754b6ba208a5ba445e8b48be2f1d95a9e5588fa622c628e319887300f69154fced814576f06c0f094e6911d21084be32f71d3afbae1b2e40be756036880e0af8ee0c23fdd010d7d1aeeff8af412a98e9a1c2b3b337a7249432ff2ee283e045b7f3c1c62e58b255482099a5568f1bb280d02bc8471fca01378545615c5fcb26ee46a8eceeff3560d5868c612b1a8062aae213f04acda68114bc9488bfc0fc48de65390b16432afe376b630ae2f749cc1a2d99628cd11807945ce1219b077abf9608397838b45bb22b93a1e40eac572e32c704bdccfb767cc46709a37b298133460ad0326cc874512d4360fec12f9f32ae91f07939541c35d7eaed44018927c5e5d06f7db60ad8c5ac5cd3824d1a9358a5bf211a1d6598fd6c62617fa83a5d95607a81de851103c0cf62ce12cecf7571cc34530cbf134956e671839dd4d7f6479d638bf332587d31892e361e085fd7782d854f47ab636bb86ba5e1d5ec7345f5f5c9b3e563e3ccb73d34fa85b2efbeff5c63655c1a7b9ecdea037666ecbc53da889617f5a84b6fae4c51298c299aa1405f314ffd1088e21ebaaa1218ce4b847d23948514d4cbf1286427c617e799a211375dc69ae419e3670b55baead3824e985fe9670ca664824b7e43be46aa6408e087ab2cd1d506d28a20b2b36df5f593a7a75cdd18bd9c28855ae8f902a5c605928dc0ace602b3766d968668a51a084adc11a14c41dba6c78ba5d6e6541b046152f9b9b45e2cce10166a48f50a3c1d9fe39c42ae59573289452c4987d6062d64a8910e58ee1b079b3dde03d2c1da6cc9863ec03bcbbce7df09635e7d91721020f7c234df89ec06857852d0896305959fc7ee78f0f250511db017f7eea0050908efdb4e595a08290bafd0c5a8fa7c4344bbeddda9db4c868aa81c54144876717b85d1a5d112a3c37ab06dc1b15f1537a59a2f6b544cce2160b4cca9a3c25af9e36d1ee647384c7cef855b6456a89ac8df5a05f923f4f3966f2c87a5fa1079ef35ce698bb2ae2b7066bad0c3a41ba6768bf62630971ad10b67a811ac13df8775583d8aba4c27e6631e3d41ef70b9c2a10ee3f7c6cbc32a2db2aed8f9904b9c63d5650aab04d913f3ae5be786f7825c95c3f85a3232ec1388813caa0c2d04b6934bd2aba0ff7b54cdae4dad35ed03008760aab36141c4b79059c9813f0193f1799f78172f3a7520d81db6f350a27e1a9ad505c732b19593c4cc31d52553d77e98ee44870f930e57e84e8a12797696db629f68695c2cdf6c0ceada129ed877e2f2b510ef41ea69ef96dc70199ff1e9206db818e95d99036a20f503dfa3e0b9bfecb0d21f7eb200af3adacc5aae7f8f359feed937d2ccab1c18332cba55e9089759c73bbe6a553d6f9164592ffe0be7cdccc9bd6580805afa9b1eb20bfa50cdb647b7ea27752ea8a3b429215324c5e22a0bf27bd110cf21f2d78c82640706585265b34541be61afdc0e95be0392e364cdeafc354f71b7aa3d953f2c9fa6cda2e665754ba4870407f3e613a1ee5d7922f9493bf22f88b9bd187d520936a63792c90519ed6a604843782efdf04feae41c9c3b55b01a6470161be764c28cdaa5bd837ceccebf7b90de63a3db377aca3090f41e7c8a8736e8ea40e02d7bd49a4f7dc43f0b3077c14a47e6084ac9dde560b2e3ab78f3d12b0ca750cf9f3fcf973164f940647a4cc8e6850af09948d46907e54f5eb49e4b10700251cdeaf1c3484e84993e8fca27902cd4d527c804f1624f654cdb14b4196745a2c3fa3a80ad4447825848529a623693241e744b8c74bc5965055be1e6557cc1fcc90468f6caf6e61fdb0e79106119491b9ee15de7e6bbb0a12032bfb83f65b254464b3a1d63fea35d5303b965c10120e21aa44f10f043c17418715c9c7c3ba2d5135a8e244e023c01985186c6ad7caf9f2036bb93f9a65ffa33d7e911b4362372712adcd5e9e035817f72a0605b1e3d8309ca434b49845c025346754701f168a366e5df8643a8cee62340f1282b87b2bdb7ef2edab0c19e500424eabf92b88602d740d1cb08df78512c82248f230ca02c806e85929071164bfecf462cacfe5d794ad7226e6e2840857d3ea23cadde1ec7eaa058fd6b39de2ae738a7f826547099e1bf01dba3c9d9315801ec03f504d03438a06b53209f2e67ef11613bf7fc3afd4413782a2f54761852b52d0164077d7136a4d0c2a44a861cbfcae8b0e32dc46534d10e173cd0c347fae76d7d2295a222e6aaa46a1b6ee670291cc01ee6415c1a7e39565b0a401177bbcf5c8312aae446893c7be14913e4670c8acd58d67c9da276adb91f9b00ffb15fe71d2acf15e6ff8106e9e068cd45036b7ba8efd113c87b1949f6e2f217264267c99219cf05f85b8a7a86cee3bdcbc82f5f3320b0e444cb3b0af96481e85367551e12551fdbfcfe30d53021b5edfb158c82333ef49422bb14e431126c352f99c8eb9e05a83dddc11d250e9c399eb835a3fac92a7315c95fa8181b2c97bbb7a26af2691eba719b56a12b88dfc0037cbcddd0f5be2e02ab2103d7e03aeb510327a7548bad04de8144edde5b4d943639c67607537811d509cf3f2095940af3ce1f5b4e940f4110029a8cfdd600798c360f230e9c87e56737661d202a52af62f13fb97bb7235579657a8fcac5ca1863a616d29db5b100d3a6ae4af13246d83033bf76859b2f721f973b84d4949fda4ba11fe41f9f5d8f826a2c4bbb234cdf0c2a990625e169f1f1f6e31f6959e626b38b3eb4c3660e5571db0bb6199fd5d020be631ab62530c68b424d6d280dab1a02ea6e7b882de28f5d32182c8658307a96c83783e03d339ff710e144a6fdab52450884db759522f4b126d3804ed6f3cced350bbbc754b1fcd74073739772f691bf3955a83f016018cbce2e2b8f896a70ac019c02f7ee8038ac6258cb1c0f4cc975d4bcb704194301572f9cf46f971d00cde91db5580247ba63b1a9e4598ed87aca53be8e111012928bb69c6f0788744af1ddc9e0501ab7af1f8f77aa8d08f5f41f8f7cf9cc009f1ab97e45dc521bb4d7915e4cf2895e367f5d3785cc0d92ebd16f9e939b07519dc1f232a551d6ef263fbbc57c53b6c644c8aa4d0c741c76c56327372b470e104778b83ab7644832fbe8e8b487cbeee80ffb5d3a03fa11bb1639f30a92426e5c6800dc7142ce7411ed13e747eedaf7301db3a226ae31757c3a2292bd0b9f4d725702a5f06c6bbe2dcb8f1010d0b43ba9b5d2d9f5f10e8a483b74b4419d60dadaa9d0d7d33ea448c894ac7eba4ee22a734054aded8a430fc09cd7a5dc9a64ee95f428758a2376f12aac86672d0960b1cd43b616208e450c8bc3b5bc848c87a8c221022cff084a0fe26d997d46109c5e07cf409436d7a047e7c35f9cf4057134dbc8bb8da1d36588e955892b5955f3002079b0efc34d84fde8afbfcb5f7ea7411d6e778f60d111c9e493655da5aeb7aaa3d882292999c2710142d5a1ac0535cf6dea994110c89b3fe141ddc7ce4efee5c4c2484b5ee802567b79d3181c74fe518a17811bf57687cea65af085942a76620eb9f882479e8d8a975ecd2012e1f4ffd9990ea59809ce9bce6361d61efcbf63b381ac7480fb23845d029bafce73eb6b608a52335e5af304283b475497c9dc9f0ba13513244167b1f3e29696ed36d70f0c029e87c51a109b3f3b33a0dd607aa22135eb3957ceca739d7df18eec097ff5d3c2f4dceaa1dd1cff57b1ebc74054dc5abef942a0739fbd06742cd2d3ee509dbe209a0fc3616629b1576f6038f7fc60b514741de66cef75d5b3ca5de810590d4421d0e08cb7bd1c1be97da9e915d7aa89d8d22938442ba0a15e5db91c34c0c8bc366438c699a04be64b33b36b8d5550871c0928b8bb56a434d6606c43c81afe84de7cc6913b3a1d0b530a32650ffd5c870975b9a1c1841aba77ca8f183032c8ffcfac2a2898747db1d71a939c6697bb44a1445cb10d264560318b9901660ad0aa2b39e62ce444557f46eb50379a62d37a5ce78c36586bae1a622e52e7da3739080b7ea755f3b5799f07cade85c72e072cbfa5c435f78f8dd662cef0ab7cadedf924dadba5c28cf73f2c8d015ea04428aba69ceacef82c2657730bf288271b2e862b95cc8144bb6751b2f2e721b518c3de13cd8799067127c589fd4cfb9de59254de8afe415c5e1a215c1bf86748c12750fb38f16fd1c448e0d1a5023670be99cc8c05d23183530d0e3bdca4c9b892c797fdca9a1066e0870e45e827b8ddc2311843aaaafc1e443ff9be02bac137c83b7835ce3f13163922ccca1e6ab10d511bcbff98d58ab28a68ad20d5703ed0dad6a182f9d5c3eb0a75bf8779c698d23504a5dde254244d4c08863df85ae7004bcf92f37798cf2e3bc0ce535e07c435ebecebfc77dc03be2712090be7c27c5d3c46f3008ec545e27e4dd86c27dcbf79c707a03b643ece04925ef13738ecec6bdf606ea6995bd7c847eaf9dbdc5c754a0ca4b2fddafa44c1fc55619ec8a3bc64c626cfbb3eb90ee9f5af4ae749e01ef8c424c67c9a92a2aaa2b062f929daac764007c74017e1cd0bd0fb9713ea0701e63e95ea45d822934dedc39f91bc6c428a4d1957c5cea645d1405a813b0daf92195650e7310c8efc778f92df7ea6211eb53d77458d609017ec931af2c41cebca1b440c5c48165af7d032550c4a74078089b7daf49d28d019b5532cc70bd9f1a4fe98970c05bbbf6e6436f0c1f23ae453ed22bd21af069b0f7af181dfe7aa3c2202ffd0ae0eb908d40a4c4613d986c416c29273f560b5189d87d8e289d39a00f2af253c169f2ab65eba5f3024f200c44256340ca8e497164bf549f2907dd03a52f73b8a8ba88dc53f1c1ec730e42b13f6d71d86009a8a1053b06f17b78ff1af7ef39ece324d6394adc36295b714c6cea84c00f1e46b41d0893138781331e9d45759633a2ba21cbda459020f28251549a8460ee93b872fa61abf734537ab8444935eb9d344ec9250ea0038920d74222f64abdd3464b4b9a6946d9e551bdccaa1bf04479255d08ba2ed7506b5760ebc83338c439507943a862bbb181226b14caa783e228366fa6f5a536dc36167a3b0a2a936c52f94d69fcb254fec4536a91af3c2151e3a00cc5902b953baea40e2a16c73eb3d77067c4ecd1e0d2c1911314337d167de5d728d353fcb28f086025e44d9d0cd85c6be0f75eea2692f1fb79db99897785bdae98b39bc6398fdcf3088d7b83a9ec6ce7d02415cf47bdced1b8febf049e2c3098378768dcf7bc278229f526e0dba3a91cfc013a8762c113a01dff085486f53a02c49aa10d41c9029b04b1dd53f37bad2e0c4fdf386ec44fceb04818a93b4ebc1e6158174671715d5e4004e40a95a85898f83a6a039e0b082795654412829d0a3b1ff475b50361d014f44b77718ff0b0fd26db259adbd719ec86016be6a71212edbdfb7cdd3197fb7a4e21d8f35c5577a4935a0b42b94c8459c755242bc0087ad60a0649b43b5e2cbc3ddca39a8ff8d64c7615c71ee4d6eadaf5ccd6c88b8f799c01cd7459d506238638539c4c08942d3fa9b5e4ff51f54b792db50e8d76864"], &(0x7f0000000080), 0x0) 03:43:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) [ 270.421678] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11074 comm=syz-executor.2 03:43:25 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 270.481265] hfs: type requires a 4 character value [ 270.519714] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11074 comm=syz-executor.2 [ 270.526270] hfs: unable to parse mount options 03:43:25 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x4000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x0, 0x3f, 0x1f, 0x0, 0x3ff, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x5, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={0x1, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000040)=0x2f) openat$cgroup_subtree(r4, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d65ef0b007c05e8fe55a10a000500ac14142603000e1208001e000000812fa800040008000300e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x159, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008104e00f80ecdb4cb902020000040e000000810040fb12000100040fda1b40d819a906000500000f", 0x33fe0}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 270.576975] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11074 comm=syz-executor.2 03:43:25 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 270.698066] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11074 comm=syz-executor.2 [ 270.754116] hfs: type requires a 4 character value [ 270.788326] hfs: unable to parse mount options [ 270.830303] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11074 comm=syz-executor.2 [ 270.850597] netlink: 2220 bytes leftover after parsing attributes in process `syz-executor.2'. 03:43:25 executing program 4: r0 = socket(0x2e, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:25 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:25 executing program 2: fsync(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4(r1, &(0x7f0000000180)=@nfc_llcp, &(0x7f0000000200)=0x80, 0x80000) setsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000040)={0xce, 0x4, 0x4, 0x2018a010, 0x8, {0x77359400}, {0x3, 0x2, 0x3, 0x2, 0x1f, 0x6, "6cc0e532"}, 0x0, 0xda1984ffb9651766, @offset=0x40, 0x4, 0x0, r3}) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000100)={0x0, @dev, @multicast1}, &(0x7f0000000140)=0xc) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="3400000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b00080003000000000008001b0000000000"], 0x34}}, 0x0) 03:43:25 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x4000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x0, 0x3f, 0x1f, 0x0, 0x3ff, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x5, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={0x1, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000040)=0x2f) openat$cgroup_subtree(r4, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d65ef0b007c05e8fe55a10a000500ac14142603000e1208001e000000812fa800040008000300e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x159, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008104e00f80ecdb4cb902020000040e000000810040fb12000100040fda1b40d819a906000500000f", 0x33fe0}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 271.039128] hfs: type requires a 4 character value [ 271.048255] hfs: unable to parse mount options 03:43:25 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 271.129310] hfs: type requires a 4 character value [ 271.151398] hfs: unable to parse mount options 03:43:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r5, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r6 = socket$inet6(0xa, 0x1, 0x0) dup2(r6, r5) 03:43:25 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="71756965742c747970653d83ccbd585bce99adacc693bcc13bfb7900000079f4fa7d08287653d231be7adc587056ceba3de9de4eb1df24f7f6e613c2fc3d5ae002c0dad507d1c98885edf354f76c8dcfb7becbeeaedb95b19a0ca3c4186f8117677e9d17342b4e1a3662cd5ce1cd7de0510b8ef6fb724cdaba7a0320df5716935b6ed612c27fb2547a3e6061f257a9ee9000"/162]) 03:43:25 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_script(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="24e8f73d71892f60afe659fb1ea96b713534a4d7f64e5858670cb45c6b8bfbc16db642c54ee5457a2c009677800d6e844b37172a2968339e158ea8f92e12908e19d548ee27dbf00ccdd32ee5707c543cb0da14abc4edd5afb20b7b4925bc940b3251a05889dccd2f4938ef3aaebe3a23eb474881a8e8fc88c943e792eaa70fd3bd9496d41775156b84511e79d231094403d8f3a0466edcc73bafe6742e797c09f4", @ANYRESHEX=r0, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYPTR], @ANYBLOB="dc04885830e557b056eb97db7e35f768d49970e0ab8ac90c6985fb3617f244aa93029ed81bb29d64d744019e8634285e1e8c02f18ad255e2c9385450e78cab13640cb095bd8cae498e33d244430f95a414833c0ac17e05c2288851d09e4af77ff4a000293fb182705cb54ceb828a49e632f131364c6efba14539dd228d8b128a548442dc255d5b2b147118324d1ba2d33703aecf200787bf6afabc264d1142c5e3a13ff7963efb10c0974253c4ee1f8df79b29d4d061210bb43be7ba2d96ed14c88a268b198225537a642f2aed834862a52bf32a50ff630dc53428eeeac0f35fce61da637a3229cf206ce501d62858156749f4376bbfb987045d016cc9bd8dae04c8d9a12bc866c975f0efd668e70ba4bcb3f8b10aaaf6555b5521597327de1f7c63ed76dc929122cd44e64b4b332ced2a24626aa0a3ec415ce024c08ccd79a9190a89723c182350326e895a4ff87c29a9174efdd098a82bd14a35708963d32d10bf31f4e1d6997e4bd5c2baa797622e4d8e131eff51c5d5da14df1f24c8334d2886a1f127704d0c320af3487056364f517c170d40288c01b7628869ba28d7b4545a6a2425dcd4d29f53045421e78bbf9c07fc18b9f08428d8f5ac4aa0e78ee57a3a4938e23425065e711fdd7437913ecdfa430e9c6d8907cf5454dd672f800f89672b819a7ce40d821019e8e7b50c8e4ad5df4f8279b0ac31e668f7e0213838c6ddb9a95fee1e1248759a491f14e9149f9d5412d7c55ca9caeeadd337abd7645801a309a1f360b1d3ea69f4cd72d94cd12cf280d6a3ef63cdc5895277ea012555c4fef9beb0e576fb510a4c8dc0f0af6c1aa4bbea0a7f1cc3b7f58b8355ae582e326f7fe32749fe166826b3a680cba7c781a0dc7faae20204470bd9acec42f631eb662ed19cb69d19dcb366544c2751da2b782bc47d531744875adbd51b6a9a5b0212d59aee711b3489a7cc7950cceb3791642ba32a9ffd5af024a39f19667f609c313cca3b60e1dd24e12fd5eacdc0d7ac7095a6ded66b403c94ad6887c1e5c310d6686bf8989e79e786a1f90903b81338364c89213b4f073faef4fa297bef2f89cc768e7e8a704474392ce5ffae2fd3efb2890a81fad24d2f30c8e00d28b19fc6296e94fc18d60ef9199b57800d7d904b2cf40905011ae6fbd953b4c0d1a8adab906cb2ff730fd0b2c75f7bcfff686e4afb69b97837ead3fcbdd4091a6ff57845bccf8450d3f50db28e5d738ff96a0c27e37a2ad97ca55438c29adb84a0480ab4f87c6e10ccaf47eb92560dd9d96c1a935607d2bddd127e3e9c4033cdf5415c649db544e8cd8585cee1a9d3514514b1aa00e26e421a43666afa302f4c7eddab688545013ca9ebd21dabcc3b0147b30d73ba308d8f113bf5bd4405f80838f647789e9806f3eb0975338505049ed61361db1d1791f8f95000015141c9d1bd57127d5c5b295df4daa30c93cfdb85e817f72ca2866612a76266f1beda1474e4296a1c2895be308759446d01a5ff714cf6ace2d4c6db1e04e72a62d780cbd88f97e4bccdc670ed1284ad8de4c009c14f1c7e8dfb13e662aca5f538aaa780b307c64628f45a57d88a7f606e46dde8f22f0e92cd589394e0fa9ee3ba86c6084bf3516caf31856d8a8b5090bd2d8f0cb5d17175fd34ce205d739a75d03e09410efe2f31188d15b7b833d864898a2900247d625c001f88bfc304903d7a5964ff81aa74462129e309b74131ac8d1da1b1fbf3455f4b4505f0e43fae32def758b87ef7799f74a28bcc442d2b17a9239952205a1321bfa36215590a2f90d00f5a216f39321573b0b80602132ed9a7ceca9296bdf5e977a90086c95b4fcbc7b033e8420549b328696cc2c6f38587472094c4e235bbd6dbb2ce74949bc795d81b752cc1561006834b40be74bc7dcfb104d089ce90a3d01b0956e8ab3d1ac35b82deea85b07ea54a04899170d3f1192f6590a62fe3dab6f8b1fedc52aad8ae903626eb11a4ced4bc3bed90acb70897fc56de4616c8849d98a43a8a6faf724b6911e250de5d7f1d056ae7ce936c434c3c2fb9d940776d792d81478eefa207d5225d93446f19f5a718cfa4d893b81143cbd7cdf3f8ecb69b2a9b53bd865c956a6e27f90e5144fef957c8b315bd93879ac435043192ea120df67c7548a956ab69b3e957664861b677bf74e84ae3df90fd717ae2ac6683eadc16561efb20467a98d4d8fd171073685e6fbdab3d30b42d6d7693eb3430f613bc6e59f7fcd302e942cc4d199cfdd87c337473b8c25f9d11fb1bdd1f1302d4b8eb249adc38b8c4bd7f21f3cda24726a3212c7633b3dd86e126572a5e64d39ca8ab47d16b9c39d339e3d80979048b594df7de8d6f2f64abee45bb353697380750b1a982170c9493e26b6e7c21b7d6aead416a5f14279df35d002f2a1aa39ffadb0d1819514a7b39627cf6e3b06de007bd956d88d91f186e02751bff4685737eacc200ac6385d3319bccc992e018e74a5866ccaf09de49d6ec5297fd33aef7c3bafc2e26e81089580958d8cd76132fc11c2b9a0c342d7c82ba34f3ddea7ce4aabdb6974733ab4f731c0a57d5796456dbc90b06fa5fd53c52f207b6758af90b55d2b4a374ae8f7ddee60c64ce4c692ca996885ffa263b29ff199366659f39f610fa3cd7d68912cd8e2ee10a75ff8e4d34ea2c9cdca1df4ce69e654deb85635f3c0f1bcb2dfdfc0e2d52a8d78a13a0691c50d114b3933290be5b81046cce5c39462f28a9ad0104ca2c41c7603062f7ee480ed3fce9418bc81262946f3f05ef47797ec84ac048c065b7b7b8830e14a0541e9f2611a2abc11d6c5292e1868adf50bbbdb5466c642cc9f01d93ac42eb5829425269feed3c0f3ddbc89723a8d8f7e06ce8f10a063a798ebc215663794d110b77e0c06615f47c7dcca4458791a6b78a9d3b49ade29a23d08457dc9286215995da51d6853b20c66461b7e8e224c972500c76f3a75ab7e532d2bc602eb09bdb3e094f297c56896b230478ab41698544c33813f062a07bed36964a9acccdb401b516ef8f603653d5f8bdae16967eacdc3b96826d666ee09c42d81f459d53308b205fdaa6307e6497672758365e564c61c355179660023d800a1908793d70f7203396efd917816fab0c56063829bf92b1219855162806865b87b20c9b06e70f5431759ece1bc1c27362a4ccfec82d5609318107e2eb6df374df8009196feaa879aa6efbd457517e041c6da15b6f91e025620ffe4e6f091833cff90b42abc3c6bf15a4a2009bca3df832ab54aaa1bba3dd1c1d6856eb00cf"], 0x906) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x811, 0x0, 0x140) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'syz_tun\x00'}) creat(0x0, 0x36) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0xf81f1bd05cec0079, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0xfffffe01}}}}, 0x30}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r9, 0x84, 0x8, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000340)={{0x1, @name="f433c3429e7ecf14bbefe9ec44aef0106a6a7587952bf77f471e201237911c2c"}, 0x8, 0x80000001, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x20001800}, 0x2000a000) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8041408}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r2, 0x200, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4080) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) [ 271.379223] hfs: type requires a 4 character value [ 271.386866] hfs: unable to parse mount options [ 271.438462] hfs: type requires a 4 character value [ 271.460103] hfs: unable to parse mount options 03:43:26 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 03:43:26 executing program 4: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f00000002c0)={{0xfe, 0xc, 0x63, 0x3f, 0xc, 0x1}, 0x1}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$MON_IOCG_STATS(r8, 0x80089203, &(0x7f00000000c0)) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000000200)={@mcast2, @local, @empty, 0x5, 0x3, 0x8, 0x600, 0x100000000, 0x40000000, r5}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") getsockname(r1, &(0x7f0000000000)=@tipc, &(0x7f0000000080)=0x80) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:26 executing program 0: openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$selinux_access(r2, &(0x7f0000000000)={'system_u:object_r:file_context_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x8}, 0x5e) syz_mount_image$f2fs(&(0x7f00000015c0)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c00004c0900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:43:26 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 271.877331] hfs: type requires a 4 character value [ 271.895457] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 271.905563] hfs: unable to parse mount options 03:43:26 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 271.920968] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 271.959861] F2FS-fs (loop0): Fix alignment : done, start(5120) end(13312) block(7168) [ 271.994579] attempt to access beyond end of device 03:43:26 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl(r1, 0x1000008917, &(0x7f00000000c0)="edb61ce2a31b0bb4b83d7f7506b8ab080cc05e0067") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7105e02b332c747970653dbe90d22e258ea8eb58640a5db972129cac507fca51d76521276e2a7ce872f63f81c6132547665797a4005f00062a37f9b2d6ca8530afdfeed166723da86d2e4b946af3e107"]) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @remote}, 0x2, 0x4, 0x0, 0x3}}, 0x26) [ 272.014502] loop0: rw=12288, want=8200, limit=20 [ 272.032838] F2FS-fs (loop0): invalid crc value [ 272.044887] attempt to access beyond end of device [ 272.050368] loop0: rw=12288, want=12296, limit=20 [ 272.056170] F2FS-fs (loop0): invalid crc value 03:43:26 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r5, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r6 = socket$inet6(0xa, 0x1, 0x0) dup2(r6, r5) [ 272.061948] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 272.069710] hfs: unable to parse mount options [ 272.101997] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:43:26 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="71756865742c747970653dbe9e803087502279ccbbf56c0ad90657bc4b9a5e9d94f9a050fc2d0cecf779ce6fe0aa3de4962241b791834fd64525e3f42266ab550b4f3f352e4638"]) [ 272.134049] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 272.142044] hfs: unable to parse mount options [ 272.170441] attempt to access beyond end of device [ 272.177732] loop0: rw=12288, want=8200, limit=20 03:43:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) [ 272.196936] F2FS-fs (loop0): invalid crc value 03:43:26 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 272.255149] attempt to access beyond end of device [ 272.284380] hfs: unable to parse mount options [ 272.291878] loop0: rw=12288, want=12296, limit=20 [ 272.309020] F2FS-fs (loop0): invalid crc value 03:43:26 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 272.336429] hfs: unable to parse mount options 03:43:27 executing program 2: r0 = socket$inet(0x2, 0x80801, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmmsg(r5, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="2b0f000000000000000067000000000000000000000073c7ca1ea0f67048f7dfbaa6ab13c7249a71fa676edf1eb2398c3a5441b07b02ae1c7d16fb9f792ade90771f2ff42fcaff485aaa8173562d127a0104b0ee1c25884ae1645fa4b1cbb4c50d6722abdd25802df3919648be74d0bbfa6f"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r5, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x50108028}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x18, r7, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IE={0x4}]}, 0x18}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r7, 0x280, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x3}, @NL80211_ATTR_SMPS_MODE={0x5}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x20}, 0x20000000) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x806d641e7e29bbbd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) 03:43:27 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x6, &(0x7f0000000000)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="717569e9812b747970653dbe"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x800000}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)="51db1490975288a761bbd512c482b93033c60b0c42a0062538b101f922f68fef7cd8d6d192b26d89c44ba657a08fd138b6b2274a0327b1f6f54351119a7e92f9e44e5ad881813d69c6c72364973e14b93dc732d1081ddd8d08efc6e0cbd0b234f5b7f782389c57a905704432fdcc42ba8ddd561cb933742b0e527877344c10bf96a6b890d9ec50", 0x87}, {&(0x7f0000000200)="223d23ba0157c07fb83df40c7291b8fe92f36f5e0bd94d2e524087edc81a16197f02481f245b12ad3df465a8db9a2dc362fa09cb7550bbc56cb60bc898c49cde69ed3d8cd74c3b0914da8621a3d727d3a955481a0ddd935033fc0a6f108ce2", 0x5f}, {&(0x7f0000000280)="d11c33d1f0b8cecdbf8f676e78c66440686bf5e8eaaca30e32413bcb169b2bf273cc3c0ea17de62d68c8fb4f4f62970e00a4bbb1e161c20d242dcdf810c69fdc64510b4947d33aa9cf19a243b0bce60662b8e825985d5a220d9d429878874c48270d07f545a62ca3a43514562db3f468da5a78369634d7483b6abedb660a62706243b2aad899db32c9d6e13058dcf06459a8aff3babba164ab9533f1a5759c487502a781844f98e7e5c4dbd585e4f86b751103bf63d22b9cb85a37ec212095904f6185030ac6f19be31e10d66858", 0xce}, {&(0x7f0000000380)="6336191f006359d709c4e64fe601e1700f832058c786cab6726de3c687a6ea1d22c3b5467650ddd59b1c4258575af978", 0x30}], 0x4}, 0x10000000) [ 272.578013] attempt to access beyond end of device [ 272.609495] loop0: rw=12288, want=8200, limit=20 [ 272.611853] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 272.627763] attempt to access beyond end of device [ 272.654074] loop0: rw=12288, want=12296, limit=20 [ 272.666649] attempt to access beyond end of device [ 272.677797] loop0: rw=12288, want=8200, limit=20 [ 272.683413] attempt to access beyond end of device [ 272.688558] loop0: rw=12288, want=12296, limit=20 03:43:27 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x0, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:27 executing program 2: mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x145849, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, r0, 0x9f73, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x67842e7b7cf018dd}, 0x0, 0x9, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x2) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='auxv\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') sendfile(r4, r5, 0x0, 0x1) r6 = getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x2, 0x3}) sched_setaffinity(r6, 0x31f, &(0x7f0000000500)=0xa000000000000005) shmctl$IPC_SET(0x0, 0x1, 0x0) pwritev(r1, &(0x7f0000000200), 0x0, 0x8180a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000740)={0x6, 0x118, 0xfa00, {{0xffff, 0x3, "8fed05131a7a08dcc4936d4e15a1f9150f35aa5c5169e99fb1829207f080e891f312a998633536382b9b094b60ff3a71815cf63fa8501b82f3c25a7723d404dcb0ef6341c92a7dc82db8bb8dbd983ae98faa80c219035ad46ec1cdd023de93253dfc11cdf300c9bfff3dcd0aca8231a2e06cd99b17a5968dbc7e2dada20d85e19e9aa7cd675a4e853456ba7f456c449be2a3ca339d68ede9c08a84bde528f521bc8fffc9aa8bfed852083ab026ce30994bd71b40159067cab93220f2f55185fcb6ebe748daec3274c31a8bb4162f35149d73667129cfd40cb014055ced4655fafb033ce373146d67b60c45f5fea377ab9be3e3395563bfff3ede41d1a435f861", 0x7, 0x9, 0x8, 0x41, 0xb3, 0x4, 0x7}, r10}}, 0x120) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r11, 0x8903, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r12, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$KVM_GET_PIT(r11, 0xc048ae65, &(0x7f0000000640)) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r2, r3, 0x0, 0x20000102000007) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r13, 0x1, 0x0, 0x6, @random="001000"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) r14 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$VIDIOC_DQBUF(r14, 0xc0585611, &(0x7f00000005c0)={0x5a, 0xc, 0x4, 0x800, 0x3, {}, {0x5, 0xe, 0x1, 0x1f, 0xf9, 0x1, "273aa72b"}, 0x3ff, 0x2, @planes=&(0x7f00000002c0)={0x5, 0x8, @fd=r12, 0x1000}, 0x5}) 03:43:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_MAP={0x24}]}, 0x4c}}, 0x0) perf_event_open(&(0x7f0000000440)={0x4, 0x2f6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@newlink={0x50, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast2}, @gre_common_policy]}}}]}, 0x50}}, 0x0) [ 272.737620] hfs: unable to parse mount options 03:43:27 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x0, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 272.827993] hfs: unable to parse mount options 03:43:27 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x0, 0x2000000000000, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 272.859901] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 03:43:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) syz_open_dev$mice(0x0, 0x0, 0x400000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r5, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r6 = socket$inet6(0xa, 0x1, 0x0) dup2(r6, r5) 03:43:27 executing program 4: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FBIOGET_CON2FBMAP(r3, 0x460f, &(0x7f0000000000)={0x18, 0x1}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:27 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:27 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 273.122579] hfs: type requires a 4 character value [ 273.127806] hfs: unable to parse mount options [ 273.247257] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 03:43:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) personality(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:28 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000000)={0x1, 0x2, [@empty, @local]}) 03:43:28 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 273.463789] hfs: type requires a 4 character value [ 273.468928] hfs: unable to parse mount options [ 273.693188] hfs: type requires a 4 character value [ 273.721095] hfs: unable to parse mount options 03:43:28 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:28 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000000000000d000097010000ffff000000ee000000010001000200000067000000000000000000000000000000000000002f0d000001000000030000"]) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x2f) recvmmsg(r1, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=""/199, 0xc7}, {0x0}], 0x2, &(0x7f0000000580)=""/115, 0x73}}, {{&(0x7f0000000600)=@caif=@rfm, 0x80, &(0x7f0000000780)}}, {{&(0x7f0000000840)=@nl=@proc, 0x80, 0x0}, 0x10001}, {{0x0, 0x0, &(0x7f0000002b40), 0x0, &(0x7f0000002b80)}}, {{0x0, 0x0, &(0x7f0000002bc0)}, 0x8}, {{&(0x7f0000000300)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f00000042c0)=[{0x0}, {0x0}, {&(0x7f0000004000)=""/80, 0x50}, {&(0x7f0000004140)=""/85, 0x55}], 0x4}, 0x4}, {{&(0x7f00000047c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000004840), 0x0, &(0x7f0000004880)=""/39, 0x27}}], 0x7, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') writev(r4, &(0x7f0000000100)=[{&(0x7f0000000000)='+4', 0x4}], 0x6) ioctl$SNDRV_PCM_IOCTL_DRAIN(r4, 0x4144, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/checkreqprot\x00', 0x105880, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xa, 0x2400000002, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$IMGETDEVINFO(r6, 0x80044944, &(0x7f00000008c0)={0x6}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x2100022, &(0x7f00000003c0)='sh\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r7, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) 03:43:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{&(0x7f0000001bc0)=@ax25={{0x3, @null}, [@rose, @default, @default, @rose, @default, @bcast, @null, @bcast]}, 0x80, 0x0, 0x0, &(0x7f0000001800)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000002280)=[{0x0}], 0x1, &(0x7f00000022c0)=""/149, 0x95}}, {{&(0x7f0000002380)=@x25={0x9, @remote}, 0x80, 0x0, 0x0, &(0x7f00000026c0)=""/47, 0x2f}, 0x6}], 0x3, 0x20, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r5, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r6 = socket$inet6(0xa, 0x1, 0x0) dup2(r6, r5) 03:43:28 executing program 4: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'syz_tun\x00'}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f0000000080)=0xffff, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$ax25(r3, 0x0, &(0x7f0000000040), 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="71756965742c74653dbe9163e399d55ba59a99b6c9d99adfa345193cdea1470945fd54bca88ff3e43d488311df9362cebc52549a80a9d1f723a2d006f9ec"]) 03:43:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:28 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 274.011668] hfs: unable to parse mount options [ 274.056135] hfs: unable to parse mount options 03:43:28 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:28 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffcb, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="71756965742ec0c0b686da3183a2c250522c3fbe58f49fb86a45347bcb6d6569a59118228f"]) 03:43:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @empty, 0x0, 0x0, 'none\x00', 0x0, 0xfffff000}, {@remote}}, 0x44) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x11, 0x2, 0x0) setsockopt(r5, 0x107, 0x1, &(0x7f0000000100)="0100000003000600000776240a52387d", 0x8d) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a08000000e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x160) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000000)={r7, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@bridge_delneigh={0x38, 0x1d, 0x400, 0x70bd27, 0x25dfdbfe, {0x2, 0x0, 0x0, r7, 0x90, 0x40, 0x5}, [@NDA_SRC_VNI={0x8, 0xb, 0x5}, @NDA_CACHEINFO={0x14, 0x3, {0xb52, 0x8, 0x80, 0x2}}]}, 0x38}, 0x1, 0x0, 0x0, 0x5801}, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x42e, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010014000270fff8", 0x268}], 0x0, 0x0) 03:43:28 executing program 2: syz_open_dev$dri(0x0, 0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x4, 0xd}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e22, @dev}, 0x10) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r3 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0xfff, 0x0) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000002c0)={0x5, 0x40, [{0xd3, 0x0, 0x2}, {0x3, 0x0, 0x2}, {0x3, 0x0, 0xf5fe}, {0x9, 0x0, 0x34e}, {}]}) fcntl$setstatus(r2, 0x4, 0x6900) ftruncate(r2, 0x800) lseek(r2, 0x0, 0x2) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) removexattr(&(0x7f0000000080)='./bus\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="6f73782e73656375726974792ac45e2c7570707031405e23766d6e657430766d6ed6ed52f32c4a805e6c16cc8355e6c44e3c8c11505f9a09ed208331"]) sendfile(r2, r4, 0x0, 0x8001) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/101}) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xdf52, 0x728df551}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) recvmsg$can_raw(r9, &(0x7f0000000cc0)={&(0x7f00000009c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000c00)=[{&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f0000000a40)=""/80, 0x50}, {&(0x7f0000000ac0)=""/213, 0xd5}, {&(0x7f0000000bc0)=""/38, 0x26}], 0x4, &(0x7f0000000c40)=""/76, 0x4c}, 0x20000000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r10, 0x6, 0x15, &(0x7f0000000d00)=0x3, 0x4) bind$alg(r6, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f0000000240)={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x0, &(0x7f0000000900)=[{&(0x7f0000000400)="0f08b2249d6666a190a1b848207d264ec2373e87c79f8714dc0fddb6c1ec527815a5292dc587b0a02739260c46e5626bc0ab45a2bc2f5ac6d136c9ec913f037f6ce799ac98621b67361972e2c8fae7df9bd971801e303827ef12fbff7e11f62fe4dc99eaee2c744a7efa838c009a00e86bc62a898c389d3a6c0f434b1dfb17c8aabc69"}, {&(0x7f00000004c0)="dc2599745a279ccf5f3cf3dd51c51a335a6f67d99b4b4a420477da260e3f621963caa9684f8b1edf9047477320fad5fd974a5b4b4b7c0cf8df539192c2dfc1d50a5360f731651c93d7f0dd75fe7400cc349bfba59e67d00d9fb22f313c583f58a50922724c6cfb91060f0587e8ae7b17ed93b7960b03c74f15d774e339639b44d0aa6572158d71528fbc0cad0cf570f4514d4ff5"}, {&(0x7f0000000580)="52d13b289ee832128f"}, {&(0x7f00000005c0)="cc38882cdf66c92f247b23f0d971f5da7dbf8c5dbdd570df20362d975734b558dd198e0a8b84a68f940ae7fac8e8370c061380308ad1749b8ad62072d2d54f6b637801e1e9cd801f93e70937a397c311da128408ca015751171e4f12be0c82878305bb942509e9c31d8138fb0229a88b540735d6b28f801a952a31"}, {&(0x7f0000000640)="72c5cfe2a2e61c9d07f133540016df33e218db3e1f8dc172ca734bb4390eeabe9ee1d865aa88d547eb9b1daa2c76ebd9688cd9df468e948847dc68e27c"}, {&(0x7f00000006c0)="1fce4bc579a472d48a8941ca09ddedf69fce277cf283be2d225c3fcaaf5233ac595e29ad07b014527a421ac8bfed037902191775944cd864ae7d992fc0ccfa68298d6e65ba036f85a950790816c65292b1473b3f111ddc8ba4cc94755ac303414bdfa7ca21fcd9f64b08aa94667ec7d5a25d57d6a144770e93af42b9a74e606a79d8c44f34fe57d894acd9119ebffae6b25f491a3aee3362e22548c1ac90e843bffd38e758696b36c20397b9db7f6d84ddb8506f96fb97a475d05cca1a9a176960c1fe37d02fbd912a5a8b154861a5342c85c1cf61b3dd4c82e48a1d432c8b2ab1dc9b683eb98daade919dd54071ab242aae252483a6a09df1"}, {&(0x7f00000007c0)="b3c0521073dde7017c15edd17b252e2dfcafadbd61f8699710bba8e9afb097812d2340b89f081eb39bd1140675967d3a9fade97d08a4a9a5b9008f68e40c04f98a94f856dafa4b7d922724c941247b"}, {&(0x7f0000000840)="019663ce2bd636c8a322b5da8cd2476e6b5cb52393a83ba223ec912bb543f172b196f8e1ebab927012b06b2e410d30ab4e713a1473e448f4d4341b40bb37299ca0aeb96ef7cf5987cf920032940b242dc0f2627e98d2461954fd9107a16bb18601dd1d3cbcc544163edb16e239c55132b323ddbbd2df79227f3d340adb44c4e2834e7666d57f675a01322cb531"}]}}], 0x400000000000074, 0x8000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0x8) [ 274.384194] device lo entered promiscuous mode 03:43:29 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 274.431334] FAT-fs (loop0): Directory bread(block 5121) failed [ 274.454655] FAT-fs (loop0): Directory bread(block 5122) failed [ 274.474103] FAT-fs (loop0): Directory bread(block 5123) failed [ 274.495418] audit: type=1804 audit(1578800609.078:85): pid=11409 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir806513644/syzkaller.UchjYg/64/bus" dev="sda1" ino=16979 res=1 03:43:29 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 274.568301] FAT-fs (loop0): Directory bread(block 5124) failed [ 274.602207] FAT-fs (loop0): Directory bread(block 5125) failed [ 274.620250] FAT-fs (loop0): Directory bread(block 5126) failed [ 274.634932] audit: type=1804 audit(1578800609.188:86): pid=11413 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir806513644/syzkaller.UchjYg/64/bus" dev="sda1" ino=16979 res=1 03:43:29 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 274.676467] FAT-fs (loop0): Directory bread(block 5127) failed [ 274.695297] FAT-fs (loop0): Directory bread(block 5128) failed [ 274.720577] FAT-fs (loop0): Directory bread(block 5129) failed [ 274.753449] FAT-fs (loop0): Directory bread(block 5130) failed 03:43:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r4, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r5 = socket$inet6(0xa, 0x1, 0x0) dup2(r5, r4) [ 274.790757] device lo left promiscuous mode 03:43:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) [ 274.876847] device lo entered promiscuous mode [ 274.888238] device lo left promiscuous mode 03:43:29 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r4, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r5 = socket$inet6(0xa, 0x1, 0x0) dup2(r5, r4) 03:43:29 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:29 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x80c5, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000001440)=ANY=[@ANYBLOB="7f454c4600000000000000000000001000000000000000000000000038000000000000000000000000002000000000000300"/88], 0x58) fanotify_mark(r2, 0x5, 0x22, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r6 = fanotify_init(0x0, 0x0) fanotify_mark(r6, 0x11, 0x40000000, r5, 0x0) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x10000) 03:43:29 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x21201, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000140)) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L-', 0x5}, 0x16, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x2e307fef8de523b9, 0x1) write$P9_RLOPEN(r2, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0x1, 0x4, 0x8}, 0x2}}, 0x18) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83630, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x83630, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce6f, 0x0, @perf_bp={0x0}, 0x0, 0x81}, 0x0, 0x10, 0xffffffffffffffff, 0x3) close(r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = syz_genetlink_get_family_id$netlbl_calipso(0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r4, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00s', @ANYRES16=r5], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r5, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 275.315976] audit: type=1804 audit(1578800609.908:87): pid=11459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir806513644/syzkaller.UchjYg/65/file0" dev="sda1" ino=16889 res=1 03:43:29 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 275.376885] audit: type=1804 audit(1578800609.938:88): pid=11459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir806513644/syzkaller.UchjYg/65/file0" dev="sda1" ino=16889 res=1 [ 275.434996] hfs: type requires a 4 character value 03:43:30 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 275.455945] hfs: unable to parse mount options [ 275.457805] audit: type=1804 audit(1578800609.938:89): pid=11459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir806513644/syzkaller.UchjYg/65/file0" dev="sda1" ino=16889 res=1 03:43:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x400000000008000e, 0x0) recvmmsg(r0, &(0x7f0000000e00)=[{{0x0, 0x0, 0x0}, 0x6}, {{0x0, 0x0, &(0x7f0000001080)=[{0x0}, {&(0x7f0000001900)}, {&(0x7f0000001a40)=""/32, 0x20}, {&(0x7f0000001a80)=""/104, 0x68}, {0x0}, {&(0x7f0000001b40)=""/116, 0x74}, {0x0}, {&(0x7f0000001000)=""/95, 0x5f}], 0x8}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00)=""/244, 0xf4}, 0x5}, {{&(0x7f0000001f00)=@x25, 0x80, 0x0, 0x0, &(0x7f0000002540)=""/167, 0xa7}, 0x7fffffff}, {{&(0x7f0000000c40)=@generic, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000cc0)=""/253, 0xfd}, {&(0x7f0000000580)}], 0x2}, 0xd7}], 0x5, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, 0x0, "000000000000f2ffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000eaffffff00"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) r1 = syz_open_dev$media(0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) io_submit(r2, 0x0, &(0x7f0000000540)) r3 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000000)) r4 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000000)) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000000)) r5 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000000)) syz_open_dev$sndtimer(&(0x7f0000000940)='/dev/snd/timer\x00', 0x0, 0x4390124466555bfd) socket$inet6_tcp(0xa, 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x261800, 0x0) io_submit(0x0, 0x4, &(0x7f0000000c00)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x7f, 0xffffffffffffffff, &(0x7f0000000440)="ee2ffe41b4d5644e8151801af7c13b3d7777850dbe50ebc5b6691359f4879a3868c342e7b22718150c7a432c4a43403778d7670c9993646c00501f5c2b1c12dd02bf9001263a00f919fca669ed5d160c0155add438da5c3ddc0e5d65fa417883ee2901bc92ccad72bc8ef4e486d74763f62011489590d0d479630e62288902f20622d382cf84d698a7cba32fcb8e72c187bb392b8a8a5c2250a4c42308e3a61b61907a1d7b57d225bf96ade0c5739e8236c9bc26ffadea3172619d6709", 0xbd, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0x0]) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r6 = accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c, 0x80000) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000f80)=ANY=[@ANYBLOB="5af7e8f233b0ffb5464d5013559c8ce1550e5b6e00c4483e3d35fede843389dbd7bbf1ff44804cfb10c12e44b0b313d499c0806bf07814884ba74568d00f8bdcd61e3eb5170b6ea4dc583d0a4fb17110eea9adc500000000000000000000000000e80000", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000280)={r7, @in={{0x2, 0x4e21, @empty}}, 0x6, 0x9, 0x9, 0x7ffe, 0x20, 0x0, 0xa7}, &(0x7f0000000080)=0x9c) 03:43:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:30 executing program 4: r0 = socket(0x9, 0x5, 0xdf) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2120e3, 0x0) fchdir(0xffffffffffffffff) accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f00000000c0)=0x5) 03:43:30 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:30 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x96003, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev}}]}, 0x154}}, 0x0) 03:43:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000000)={0x4}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) bpf$PROG_LOAD(0x5, &(0x7f00000044c0)={0x0, 0x9, &(0x7f0000000280)=ANY=[@ANYBLOB="0da5080000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000018270000", @ANYRES32, @ANYBLOB="001000000000000000000000cd07000000000000143f905b67bb00000000000000000000688f144869f755cf1303917d91e0df34d7a88fdbd8b3cba6a1feb5ff07000000000000158dee72d0cdea2bcc34fd", @ANYRES32=r5, @ANYBLOB="00000000080000000145030008000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f00000042c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000004300)={0x0, 0x0, 0x3}, 0x10}, 0x78) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, r1, 0x1458f01c193b555c) [ 275.781120] hfs: type requires a 4 character value [ 275.799426] hfs: unable to parse mount options 03:43:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 275.845195] hfs: type requires a 4 character value [ 275.877092] hfs: unable to parse mount options 03:43:30 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:30 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000380)="0f20e06635000002000f22e00f35ba610066b80000000066efbaf80c66b8e8ee668466efbafc0cec26e0480f019a91d10f23630f01dff33eff45000f20e06635000004000f22e0"}], 0x0, 0x0, 0x0, 0xffffffffffffffc4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x400, &(0x7f00000000c0)=0x4) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:43:30 executing program 4: socket(0x10, 0x80002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000200)="080da3e8858d65440f010c49e7fbfbbe4f1c25a3c986e22e7f5b1e315cb0e7101ed5feb3b04a08d248a8ea6b2c6d18be4acaea253dbaacc566a8052cdb85e0fcf91fe6377cb15108a88765976692ea682d8386bdd4912613d5ec8ab8251558a0df782f0e3178500e2b4cf8261a10ffae69b779291461382298ee781eb563f0dffc07207a678e5ec080da1f49f9ef314f2ae0578e2a3e406d02931f9f9c7a") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="71756965743c747970653dbee39f9b9416cfa28367406995c11f3b559aa0350bbbfd2f8790edb50ed85a8b27ed48f6c375009c36790d83577e55ed3150f4e24f3ebc66d78209347efa512991cc"]) 03:43:30 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:30 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 276.219269] hfs: unable to parse mount options [ 276.277272] hfs: unable to parse mount options 03:43:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}, 0x9d6b}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = gettid() sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="4c00000010000100"/20, @ANYRES32=r2, @ANYBLOB="0000000000005e83841a463b2f7939fd8bdfde62000008001300", @ANYRES32=r4, @ANYBLOB="24000e00"/36], 0x4c}}, 0x0) bind$netlink(r3, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfd, 0x801}, 0xc) 03:43:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:31 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESOCT=r1]) 03:43:31 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:31 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 276.669141] hfs: unable to parse mount options 03:43:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) [ 276.746246] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 276.876000] hfs: unable to parse mount options 03:43:31 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 277.147346] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 03:43:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}, 0x9d6b}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = gettid() sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="4c00000010000100"/20, @ANYRES32=r2, @ANYBLOB="0000000000005e83841a463b2f7939fd8bdfde62000008001300", @ANYRES32=r4, @ANYBLOB="24000e00"/36], 0x4c}}, 0x0) bind$netlink(r3, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfd, 0x801}, 0xc) 03:43:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0x4, 0xffffffff, 0x6, 0x1, 0x4, "aefee9495c9cf6f8e6a2280f3e9f69a20ebcc2"}) r3 = socket(0x4, 0x80002, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) 03:43:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}, 0x9d6b}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = gettid() sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="4c00000010000100"/20, @ANYRES32=r2, @ANYBLOB="0000000000005e83841a463b2f7939fd8bdfde62000008001300", @ANYRES32=r4, @ANYBLOB="24000e00"/36], 0x4c}}, 0x0) bind$netlink(r3, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfd, 0x801}, 0xc) 03:43:32 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:32 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r8, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r7, r8, 0x0) 03:43:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) [ 277.658290] hfs: type requires a 4 character value 03:43:32 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 277.683305] hfs: unable to parse mount options [ 277.857531] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 03:43:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) [ 277.903579] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 277.914270] hfs: type requires a 4 character value [ 277.928819] hfs: unable to parse mount options 03:43:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) 03:43:32 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x23a5c0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180)={0x400, 0xffff, 0x997, 0x9}, 0x8) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x62, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400854d5, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x6}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:43:32 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:32 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:32 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.controllers\x00', 0x275a, 0x0) preadv(r1, 0x0, 0x0, 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) socketpair(0x5, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x20, 0x32, 0x119, 0x0, 0x0, {0x2}, [@nested={0xc, 0x1}]}, 0x20}}, 0x0) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f00000000c0), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x2, r3}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x5, 0x209, 0x401, 0x6, r3}, 0x10) syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f0000000240)={0x0, 'veth1_to_bond\x00', {0x3}, 0x5}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xffffffffffffffcd, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_elf64(r7, 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) fsetxattr$security_evm(r9, &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@ng={0x4, 0xa, "f694db26264a4b3bd9c802"}, 0xd, 0x1) [ 278.122879] hfs: type requires a 4 character value 03:43:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) [ 278.158902] hfs: unable to parse mount options 03:43:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) [ 278.293865] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 278.329202] audit: type=1400 audit(1578800612.918:90): avc: denied { setopt } for pid=11666 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:43:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r7, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r6, r7, 0x0) 03:43:33 executing program 4: r0 = socket(0x10, 0x80407, 0x0) r1 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r6, 0x103, 0x6, &(0x7f0000000100), 0x4) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r5, r6, 0x80000000}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") ioctl$TIOCGICOUNT(r5, 0x545d, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:33 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @loopback, 0x800, 0x0, 0x0, 0x200, 0x100000000, 0x40004}) syz_open_dev$vcsa(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6(0xa, 0x1, 0x0) syz_emit_ethernet(0x6e, &(0x7f00000005c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00140600fe8000000000000000000d00000000aafe8000000006000000000000000000aa000000001249db86924f82eb53a2b7ae459d15372e441969faad87f51950141261d1360c205c4c8f0614810292bbb105f9c8812a991874942faf1cef05221e9cc98b6ff5ed038b5e03e2255014df04fa3b87d62ad1b276dc1d04c5217bdd7275", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50001e84f846af96b1665f60f76640dd499dbd0fa2fde84909ab8cfd59bc14c0ec993b1346f24d4dd0707d4bd4e469267b916180158c2ee13b476a1790ffd72905e24cad9b60f0530704dd8199771ddc094eb2152b3fc29c481bb1ad634af3055b9569d4a4014133e7a9802bdb468f2aba4f931c6401629e194663af275c5483251109ac23fa66c440912118684b1bc0ef361e12a0a7a0fe3c56e61d0c4b393f06bf3d32d48ab1ecbf7520150498389290c022364cb86721efa05021723c4bc0b78e29a920880d613f4fd5b08958278e9865bf2e78de063967b2ee9a0b0b2963997b7694f92001229ecf000000000000"], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x20005d) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600800000000000000000000002000600ca3f8bca3b0000003800000000ff00f7ffffffffffff1f000200000000000000b500000001000000000000000000bf7f00000000000100000000e4000000310ff30c0853552e30f56202002c95723f068fe42d0000000000000000"], 0x6f) close(r1) r2 = getpid() syz_open_procfs(r2, 0x0) getpgid(r2) creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$USBDEVFS_DROP_PRIVILEGES(r5, 0x4004551e, &(0x7f0000000080)=0x8) fstat(0xffffffffffffffff, &(0x7f0000000500)) getpid() socket$inet6(0xa, 0x2, 0x0) 03:43:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) 03:43:33 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 278.433290] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 278.470608] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:43:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) [ 278.519713] hfs: type requires a 4 character value [ 278.525243] hfs: unable to parse mount options [ 278.531600] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:43:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) 03:43:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) [ 278.767547] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.776276] bridge0: port 1(bridge_slave_0) entered disabled state 03:43:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) [ 279.146473] hfs: type requires a 4 character value [ 279.151679] hfs: unable to parse mount options [ 279.158250] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 279.177415] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 279.186911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.211031] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 279.217144] 8021q: adding VLAN 0 to HW filter on device team0 03:43:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.controllers\x00', 0x275a, 0x0) preadv(r1, 0x0, 0x0, 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) socketpair(0x5, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x20, 0x32, 0x119, 0x0, 0x0, {0x2}, [@nested={0xc, 0x1}]}, 0x20}}, 0x0) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f00000000c0), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x2, r3}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x5, 0x209, 0x401, 0x6, r3}, 0x10) syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f0000000240)={0x0, 'veth1_to_bond\x00', {0x3}, 0x5}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xffffffffffffffcd, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_elf64(r7, 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) fsetxattr$security_evm(r9, &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@ng={0x4, 0xa, "f694db26264a4b3bd9c802"}, 0xd, 0x1) [ 279.250593] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:43:33 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) 03:43:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r7, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r6, r7, 0x0) 03:43:33 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x7, 0x3, 0xe6, 0x3ff}, {0x6, 0xcd, 0xca, 0x8}, {0x400, 0x0, 0x30, 0x3}, {0xd1a7, 0x4, 0x3, 0x20}, {0x3, 0x3, 0x8, 0x7ff}, {0x5, 0xc0, 0x3, 0x7fff}]}, 0x10) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x143800, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00a983520000000000000000005ced27777e15176db0d37e903621c4f24fb9a9"]) 03:43:33 executing program 0: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000700)='cgroup.max.depth\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000001000)) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="0000cde3000000004413cc8ed0df90ac8236d69baf6a4cc791e2d92bf1914e757ed3615c6e326107f3a24d6c2fc8c4aedef3f6ee383c67558435508054c0ffc31fbdac7c5b2e101c9f0536181bb2daa3ff5ed191d85b7b4760770c41804d0d24516703000000000000fdca093fcd4cd6bbbe3537779ddd49f95254da1ff77481f67460fb41ce047dff"], 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000000020000b0000000000000006801000000000000b00000006801000068010000680100006801000068010000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b000000000000000000000000000000000000000000040004c4f470000000000000000000000000000000000000000000000000000000000e164426fbe80279fd1f3757240feb1924a8b7bf0724918eff7efb257f700ac1414aaac1414bb000000000000000076657468315f746f5f626f6e640000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090d69fcfbfb8000000007000b8000000000000000000000000000000000000000000480049444c4554494d45520000000000070000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feff"], 0x260) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xb0, 0x0, 0x168, 0x0, 0xb0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e164426fbe80279fd1f3757240feb1924a8b7bf0724918eff7efb257f700"}}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe7) chown(&(0x7f0000000140)='./file0\x00', r3, 0x0) r4 = getpgrp(0x0) setpriority(0x0, r4, 0x8001) r5 = socket(0x1e, 0x2, 0x0) bind(r5, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r5, &(0x7f0000000000), 0x10) bind(r5, 0x0, 0x0) r6 = socket(0x0, 0x2, 0x0) bind$tipc(r6, &(0x7f0000000000), 0x10) bind(r6, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) socket(0x1e, 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000440)={0x9e0000, 0x8, 0x1ffc0000, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x1951b23, 0x4b, [], @value=0x3}}) bind(r7, &(0x7f0000d80f80)=@llc={0x1a, 0x0, 0x6, 0xff, 0x0, 0x81, @broadcast}, 0x80) r8 = socket(0x1e, 0x2, 0x0) bind$tipc(r8, 0x0, 0x0) creat(&(0x7f0000000080)='./file0/bus\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 03:43:33 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) [ 279.370618] hfs: can't find a HFS filesystem on dev loop4 03:43:34 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 279.441757] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:43:34 executing program 4: r0 = socket(0x1f, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) [ 279.519919] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 279.574076] hfs: type requires a 4 character value [ 279.589957] hfs: unable to parse mount options 03:43:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 279.640554] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 279.696019] hfs: type requires a 4 character value [ 279.706339] hfs: unable to parse mount options 03:43:34 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:34 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x6fa, 0x2) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000100)={0x6, 0xba, "56f80f8d7c9ad684157765ee68815e033b7b2972a2d067318db9ac518603e0dbae813e160bd3f15b30c226056579cf64ac2525dd44c15e56204f1e3f1b8c03b31f4281605682d4b39a61b89636b3a2a5ea0bd3f5e8bd40d8c0406969d18fed78e4f4108902b5959ec383c40036f5262e703d6ad6a7a486302c382e45645bfe4c472249b482a28e9519e744cdbe884985d913612a17250eab7e4f0bf4b35aab9f7b923116a8d30baf612ca3bc2ef9b3f8d1c6b570cb60bd8d5b68"}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f00000000c0)={0x51, 0xfffc, 0x9, {0x0, 0xf1}, {0x9}, @ramp={0x2, 0x3, {0x0, 0x0, 0x7}}}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r3, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r3, 0x0) unshare(0x40000000) r4 = accept(r3, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000200)=0x61, &(0x7f0000000240)=0x4) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) write$binfmt_elf64(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c460009000000ddff00000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000ff0f00"/376], 0x178) 03:43:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:34 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$rds(r3, &(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 279.942101] hfs: type requires a 4 character value [ 279.954350] hfs: unable to parse mount options [ 280.017031] hfs: type requires a 4 character value [ 280.026466] hfs: unable to parse mount options [ 280.089177] audit: type=1400 audit(1578800614.678:91): avc: denied { write } for pid=11797 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 03:43:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r7, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r6, r7, 0x0) 03:43:34 executing program 0: syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x10000) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000700)='cgroup.max.depth\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, &(0x7f0000001000)) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="0000cde3000000004413cc8ed0df90ac8236d69baf6a4cc791e2d92bf1914e757ed3615c6e326107f3a24d6c2fc8c4aedef3f6ee383c67558435508054c0ffc31fbdac7c5b2e101c9f0536181bb2daa3ff5ed191d85b7b4760770c41804d0d24516703000000000000fdca093fcd4cd6bbbe3537779ddd49f95254da1ff77481f67460fb41ce047dff"], 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000002c0)=0x8, 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000020000000300000000020000b0000000000000006801000000000000b00000006801000068010000680100006801000068010000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b000000000000000000000000000000000000000000040004c4f470000000000000000000000000000000000000000000000000000000000e164426fbe80279fd1f3757240feb1924a8b7bf0724918eff7efb257f700ac1414aaac1414bb000000000000000076657468315f746f5f626f6e640000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090d69fcfbfb8000000007000b8000000000000000000000000000000000000000000480049444c4554494d45520000000000070000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feff"], 0x260) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x2, 0x3, 0x200, 0xb0, 0x0, 0x168, 0x0, 0xb0, 0x168, 0x168, 0x168, 0x168, 0x168, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e164426fbe80279fd1f3757240feb1924a8b7bf0724918eff7efb257f700"}}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_bond\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe7) chown(&(0x7f0000000140)='./file0\x00', r3, 0x0) r4 = getpgrp(0x0) setpriority(0x0, r4, 0x8001) r5 = socket(0x1e, 0x2, 0x0) bind(r5, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r5, &(0x7f0000000000), 0x10) bind(r5, 0x0, 0x0) r6 = socket(0x0, 0x2, 0x0) bind$tipc(r6, &(0x7f0000000000), 0x10) bind(r6, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) socket(0x1e, 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000440)={0x9e0000, 0x8, 0x1ffc0000, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x1951b23, 0x4b, [], @value=0x3}}) bind(r7, &(0x7f0000d80f80)=@llc={0x1a, 0x0, 0x6, 0xff, 0x0, 0x81, @broadcast}, 0x80) r8 = socket(0x1e, 0x2, 0x0) bind$tipc(r8, 0x0, 0x0) creat(&(0x7f0000000080)='./file0/bus\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 03:43:34 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:34 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x4000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDGKBDIACR(r4, 0x4b4a, &(0x7f0000000100)=""/18) getpeername(r1, &(0x7f0000000040)=@ax25={{0x3, @bcast}, [@remote, @default, @default, @null, @bcast, @rose, @default, @default]}, &(0x7f00000000c0)=0x80) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000200)=@v1={0x2, "d4afdacaa591100193ab7fe6985287"}, 0x10, 0x3) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 280.213610] hfs: type requires a 4 character value [ 280.218562] hfs: unable to parse mount options [ 280.253112] IPVS: ftp: loaded support on port[0] = 21 03:43:34 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 280.344351] hfs: type requires a 4 character value [ 280.351954] hfs: unable to parse mount options 03:43:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:35 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x8, 0xffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = gettid() clone(0x100000100001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) kcmp(r0, r0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r0, 0x0, 0x0) 03:43:35 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x100901, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:35 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) r1 = syz_open_dev$mouse(&(0x7f0000001a80)='/dev/input/mouse#\x00', 0x54d4, 0x7f36449651360bbe) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x182602, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000640)={0x47, 0x6, 0x0, 'queue1\x00', 0x8}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000100), 0x4) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r5, 0x103, 0x6, &(0x7f0000000100), 0x4) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r6, 0x103, 0x6, &(0x7f0000000100), 0x4) r7 = fcntl$dupfd(r6, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) recvmmsg(r7, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r9, @ANYBLOB="2b0f000000000000000067000000000000000000000073c7ca1ea0f67048f7dfbaa6ab13c7249a71fa676edf1eb2398c3a5441b07b02ae1c7d16fb9f792ade90771f2ff42fcaff485aaa8173562d127a0104b0ee1c25884ae1645fa4b1cbb4c50d6722abdd25802df3919648be74d0bbfa6f"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r7, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x50108028}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x18, r9, 0x0, 0x0, 0x0, {}, [@NL80211_ATTR_IE={0x4}]}, 0x18}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000001b80)={&(0x7f0000001ac0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001b00)={0x1c, r9, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x1c}}, 0x10) sendmsg$kcm(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000080)="b9ac0d4d6d7b17eb9cd0811b7eb8cc410992e3a3d562127ed5b929d808a8e4ff0f35cc8752b4973cee91a30b180279a51524d13cdfef171f5372a5988d7e72cb344aba89d4a6785ec38179d4a354a8643314407bfa40a53966457ecb99e983addc4c10db8e22bd69e08235f9c86a8039aeaa76eec0607886c92431944cb295545840aa6cfc99f535539cd50bfcd8d33abc595e7ae2a4c266e3b996822a6a63605d822bc0ff68b46c8b5a5ab74143045f241b9b87b054635aac5a5f43a0fa4ba8fcdbf6867658f35c427e9a7d9d164925e94207", 0xd3}, {&(0x7f0000000200)="46861321c11e96deb7e7fb0ec61a18936360d72737bd54819b1385881b85ffa1eb39a3f435da1b70efcdb830efb4a1f99fe1cdfa07ecf7840dc1b5887313802213fdbee5fe18864a397fff90054043aeac3108ab1433f994d81e41c5f8d39c3ddc1c5d3ce4deccef196ce0fda646c91f8554db60f93c7bfef36588d88722767fde6560e01de8c528faf6a0af18212cbc50e6", 0x92}, {&(0x7f00000002c0)="b7d98e929ee4f6cf5ed077e69b3e09423cc7885651d91dc798cdef8458da14ebba90819620484819245d1d9d5af5b808ac5436ae1d17a97c5a7e0305504158a93df277e045e0eff8525aa18312548bbee73eea81f98dc70c45b2b342954c73ca9f1c3780356ea276b34d5c331d8d720d81bc772f6abd26dd658a8f093695e3d71536b5563a75ee46d281cdf30e75bae24d435ec5b4beb221d1182d0411879ace31c94a19593d921c9f7eec40ea3f41531ae4e1", 0xb3}, {&(0x7f0000000380)="bb194de15dd8f53bc88ad55a4a1ee95ac9369650454258b1ef4466ba2d157ba33a909e9c4b1c47972cc7961c41059cd719afb35a09d4b97d712e3c0755d2ac129526f49e8d6a7a35e1fc9ca1926a04888353ed833e3a259f0ab0bb5fbd8da1d3b07e221268b3d42de1155b3f412d6b76ab59a687e50ed8ca7fad7839034dca6b03d1eecbd67c61db6f8dab00fc9ae1315824769b233c6b95bf", 0x99}, {&(0x7f0000000440)="7525bd91f0ca8675180b649589848751bf232fa403b6cca62b3a0cba7d081651b28cd975190e72", 0x27}, {&(0x7f0000000480)="86b9637d0a5a8fb2ecc41ca0c00a4df6ecef2b6501809915b4bda0af453a35397f68d071249048bee9cf593ad2267b87b16be6dd6f2b14f31534331993f872488269d9bef1312d06bfeda031a4df27e3ec17fce720b4113219f720e44e29b4a51980e8ac99e856419a03bfbf8f3f8885bf3bcc07e2060b0fbdcdc6ce50adf9eaa2b4855d25c01417873585a9a616b18a2860", 0x92}], 0x6}, 0x1) 03:43:35 executing program 0: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000081000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4000000, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) write$evdev(r5, &(0x7f00000002c0)=[{{}, 0x11, 0xff, 0x9}], 0x18) 03:43:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r5, r6, 0x0) [ 281.196508] hfs: type requires a 4 character value 03:43:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 281.216775] hfs: unable to parse mount options 03:43:35 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:35 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xeb, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="d9812fa2bd083cbf", 0x8, 0x8b50}, {&(0x7f00000000c0)="b9eaa7bc3d898d15b51e2f399400f6bf22239dc0efc085d73392f375dc7844a2a364fa061a151fafd9c53bfcb4d591e6817d403470d0ae0a271d35523d787eeac16fb7b137f0bf2ec7920dc8f9d4fab080a1e364b4158be6ef74772718c6c4949fd7ed60cd1ed0dfd317a8255480e3b0b7c228279b4767e3d9b8f551a1f8c3c175a6c708a9844ce7e3fb3c42fc53243ed01f0360662d46964814ee73249638fed9c409d2e872a0adf1b0d44bad", 0xad, 0xa7d}], 0x10000, &(0x7f0000000240)={[{@umask={'umask', 0x3d, 0x42a}}], [{@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 03:43:35 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 281.346912] ptrace attach of "/root/syz-executor.2"[11881] was attempted by "/root/syz-executor.2"[11884] 03:43:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$RDS_CANCEL_SENT_TO(r4, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 281.443703] hfs: type requires a 4 character value 03:43:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f00000001c0)={0x7f, 0x1a1, 0x0, 'queue0\x00', 0x9}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x7, 0xf) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) syz_open_procfs(0x0, &(0x7f0000000140)='auxv\x00') ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0x1000800}, @xdp, @vsock={0x28, 0x0, 0x0, @hyper}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='vlan1\x00', 0x1, 0x2, 0x8}) [ 281.482662] hfs: unable to parse mount options 03:43:36 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 281.576806] hfs: type requires a 4 character value [ 281.598891] hfs: unable to parse mount options 03:43:36 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:36 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RFLUSH(r2, &(0x7f0000000000)={0x7, 0x6d, 0x2}, 0x7) [ 281.794236] hfs: type requires a 4 character value [ 281.834995] hfs: unable to parse mount options [ 281.904333] hfs: type requires a 4 character value [ 281.910010] hfs: unable to parse mount options 03:43:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/168, 0xa8}}], 0x2, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r5, r6, 0x0) 03:43:36 executing program 0: chdir(0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x60) fallocate(r0, 0x8, 0x0, 0x10000) 03:43:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:36 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:36 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3, 0x3, 0x7f, 0x1}, {0x8, 0x7, 0x48, 0x6}]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000100), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x4010, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@subj_user={'subj_user', 0x3d, ',usernodevbdevlo$keyring\xc1#.&'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@subj_role={'subj_role', 0x3d, 'eth1md5sum,em1]cgroupppp1['}}]}}) 03:43:36 executing program 2: pipe(0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x77, 0x0, 0x5}, 0xb) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) read$rfkill(r0, &(0x7f0000000000), 0x7826) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$SOUND_OLD_MIXER_INFO(0xffffffffffffffff, 0x80304d65, 0x0) 03:43:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 282.027698] audit: type=1800 audit(1578800616.618:92): pid=11953 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=17032 res=0 [ 282.093283] hfs: type requires a 4 character value 03:43:36 executing program 0: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x25024}, 0x0, 0xffffffffffffffff, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x700}) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, 0x0) getpid() mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000e96000/0x2000)=nil) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f00000001c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r10, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x4}}, 0x81, 0x2}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000140)={r11, 0xd70}, &(0x7f0000000180)=0x8) r12 = fcntl$dupfd(r3, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) write$P9_RFSYNC(r12, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYRES16=0x0], 0x2) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x4, 0x0, 0x0, 0x10000000002) 03:43:36 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 282.124259] hfs: unable to parse mount options 03:43:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2}) creat(&(0x7f0000000380)='./file0\x00', 0x40) io_submit(0x0, 0x20000000000000dd, &(0x7f00000006c0)) getsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f0000000300), &(0x7f00000002c0)=0xfffffffffffffdd9) perf_event_open(&(0x7f000001d000)={0x1, 0x7d, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0xb35c4a6a87064b89) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @mcast1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() 03:43:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 282.234567] hfs: type requires a 4 character value 03:43:36 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 282.261793] hfs: unable to parse mount options 03:43:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r4, r5, 0x0) 03:43:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:37 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x1, 0x2000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r3 = socket(0x10, 0x80002, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4800) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f00000000c0)={0x4, 0x2, 0x1, 0x5}, 0x8) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="303501a1d2e1ba0c904ffb") ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x1, @local, 'sit0\x00'}}) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="71756965742c747970653d410e2eb6be9dd7336bc76a83935ebfc2bff3ca1eb2f67fb03c25b5ae46c05256f0be17d5df67d857e38acbd4a052ad0dfef196bfcefca66a77dded7d3504af73e15d91b43bc5752e91c3f1db78fa2a9609b8ca0b29f733b3888fb3960409c4a9a43de6d378f7fa0106d06d71294d298a970fa94150c3601f626aa86388c9410079d39f0185eb76f1fc3fc843399621e7cf721f653531a2920f36b83876570210568c923bae4a49c17739ddc5794a370b266cc8787ee49a1659b6e8e24a570e04662f2027c9c439441af77ce5e79b4ca54122a46fe783b7f9afb4e2fbb29e92e4"]) 03:43:37 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3, 0x3, 0x7f, 0x1}, {0x8, 0x7, 0x48, 0x6}]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000100), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x4010, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@nodevmap='nodevmap'}, {@access_user='access=user'}], [{@subj_user={'subj_user', 0x3d, ',usernodevbdevlo$keyring\xc1#.&'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0x1e}}, {@subj_role={'subj_role', 0x3d, 'eth1md5sum,em1]cgroupppp1['}}]}}) 03:43:37 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c00810ee00f80ecdb4cb9e307f029a00d0000002f003efb0a0002000000000000000f00050005000600", 0x2e}], 0x1}, 0x8110) 03:43:37 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 282.889267] hfs: type requires a 4 character value [ 282.889912] PF_BRIDGE: RTM_NEWNEIGH with invalid vlan [ 282.904840] hfs: type requires a 4 character value [ 282.917774] hfs: unable to parse mount options [ 282.940092] hfs: unable to parse mount options 03:43:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r4, r5, 0x0) 03:43:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}], 0x1) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:37 executing program 0: mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r5, 0xb704, &(0x7f0000000300)=0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="8469cab3c3b66c1725553f5cbd5e40ea3e468ba0e377a236fb98a62395b93616d27629173ca6426397ba83a08c0af414e695e92e3c3a4f20748217637598780811d58cefaf0efe8992b04f06f079197d3cea344ee55eafeed9d4fb4cda407a3c", 0x60, 0x8000}], 0x1, &(0x7f0000000380)={[{@utf8no='utf8=0'}, {@shortname_win95='shortname=win95'}, {@rodir='rodir'}], [{@subj_user={'subj_user', 0x3d, 'overlay\x00'}}, {@subj_user={'subj_user', 0x3d, 'overlay\x00'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r2}}, {@obj_user={'obj_user', 0x3d, '%-.{\'lo'}}, {@fowner_gt={'fowner>', r6}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r7 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f0000077000)=""/117, 0x75) 03:43:37 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r1 = socket$inet6(0xa, 0x3, 0x5) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000100), 0x4) pwritev(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)="11bd447ff126f6ff1811054089e7b296869e892427fc59a93316b7e8cc50ca9f71dee2106348b47b84e9f7955eb30d7dbdfcab118cb5e33123f620ef29e96d9448319190f4e92f2b3a652f11784d702d8884b5ea3efb33342d523a809f497dc6b97151821eb80c583ab57da4077ceba07f46629b6719eadb04bdd1c1d2c9ba62d71dc6daffc3", 0x86}, {&(0x7f0000000380)="4a668b33b69d642852401f12e3af5a5f5ddc9e857fc8de2af8333f57fd4f2a8cadfebfcb55dcc30a2052a3109d78959b7ae86cdff3becb0130cb809b385f31e5e5ce91f6df38f4f9c79cf308749ee2e8af43a2d7c58bf70cb12eb83cc389aa84e05c9ba4e8f3cfabe0c8c438fbe2e5202b5b3ffe6ed259496e03e1ed0657be9ae5209340697dd94326e9de9a6c5aff92507038b5c1b83e568146d544f860c0d878e7874d5031be7a61ce376c28e31c40f18fb123d7882ce02e2f76b1c06602ecc2f77e5c0e543441fd6aabe3fe5f9f", 0xcf}], 0x2, 0x7) syz_open_procfs(0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) r6 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setownex(r6, 0xf, &(0x7f0000000280)) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, 0x0) pwrite64(r6, &(0x7f0000000140)="a0252f10ce70a13345b37a8e110f0a3c4822bae5abeb55d53d02e4ba083c7de6e919d9523089d46e66eab7c16b13cce3d65e6469103781fe4e4f5fd3ddb205537d644d92f32e4b22947bce54f2a0aa8e4cce2b", 0x53, 0x8) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) [ 283.108397] hfs: type requires a 4 character value 03:43:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) [ 283.138065] hfs: unable to parse mount options 03:43:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}], 0x1) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:37 executing program 4: r0 = socket(0x5, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:37 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 283.253623] FAT-fs (loop0): Unrecognized mount option "subj_user=overlay" or missing value 03:43:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:37 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'\x00', 0xd102}) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000ec0)=""/202, 0x31000}], 0x1, 0x0) dup2(r0, r1) gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = gettid() sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_MAP={0x24}]}, 0x4c}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'syz_tun\x00'}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r6, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2002}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x98, r7, 0x308, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, [@NL80211_MESHCONF_MAX_PEER_LINKS={0x6, 0x4, 0x23}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5, 0xe, 0x2}, @NL80211_MESHCONF_MAX_PEER_LINKS={0x6, 0x4, 0x31}, @NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0xf7}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x1}}, @NL80211_ATTR_MESH_CONFIG={0x24, 0x23, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7f}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5, 0x11, 0x1}, @NL80211_MESHCONF_MAX_PEER_LINKS={0x6, 0x4, 0xe1}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x1}}]}, 0x98}, 0x1, 0x0, 0x0, 0x800}, 0xc000000) tkill(0xffffffffffffffff, 0x10033) [ 283.330512] overlayfs: filesystem on './file0' not supported as upperdir 03:43:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}], 0x1) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:38 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 283.401433] FAT-fs (loop0): Unrecognized mount option "subj_user=overlay" or missing value [ 283.478197] hfs: type requires a 4 character value 03:43:38 executing program 5: fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) [ 283.503378] hfs: unable to parse mount options 03:43:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x100, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x400, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x5, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @null]}) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, 0x0}, 0x1) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) renameat(r5, &(0x7f0000000180)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r7, &(0x7f0000000480), 0x10000000000002a1, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="010000007cc8116745c5cbcc4dd7e42d68351d6e5d6eae1d696fd59928e9e4f5062560d688aca28ac58ebd41e52e82aebb445c408eb8d289c1c2ce30fef89f3bae82ea5c36c8b91081edb34df0c18cc12d2cd9e814c618bb9692b92f09e60b710c2ac6e0b1f5076e247fdb975ef80b1776d7b5cb5e92678c42a91c17f7e3b6e66f65c9278c9cbe8dd0f9ee3b8b36669dab4cc2f504ea9eff93f602e7fbf29475b2ea0e012916184f", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r8, 0x84, 0x14, &(0x7f0000000480)=ANY=[@ANYRES32=r9, @ANYBLOB="a480dba9fee1e6ec37e2a9a5d941e474d2064a88b59865aee35c25ff57f83a68c783d70fe0e5d7814c6f357b0a9c37d0293225b8f0a550c01fdf6e18ad090036a318b11e73dea563ce23c0c5ce7a3f17720800000028c530b3311d3044fdb5fbf47217fbf6b6a94edf0ba52e7b22fc97a3d21b82b48ac160e409be437ad63896a0b01b76c7009a3791fba204697aaac4d5cefa47047095bd033c4e62d923f24bf872ae33353668b4af80"], &(0x7f00000000c0)=0x8) sendmmsg(r6, &(0x7f0000005d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = fcntl$dupfd(r13, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) linkat(r12, &(0x7f0000000200)='.//ile0\x00', r15, &(0x7f0000000280)='./file0/f.le.\x00', 0x400) [ 283.652755] hfs: type requires a 4 character value 03:43:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 283.700622] hfs: unable to parse mount options 03:43:38 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:38 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, &(0x7f0000000000)={0x81}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r3, &(0x7f0000000040)="32be52ee90edd26e0d487f645b90dd8c", &(0x7f0000000080)=""/96}, 0x20) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) [ 283.777190] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 03:43:38 executing program 5: fallocate(0xffffffffffffffff, 0x10, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:38 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 283.974737] hfs: type requires a 4 character value [ 283.979716] hfs: unable to parse mount options 03:43:38 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x4004, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 284.096299] hfs: type requires a 4 character value [ 284.116151] hfs: unable to parse mount options 03:43:38 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:38 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000000)={0xb88, 0x6, [0x6, 0x9, 0x5, 0x6, 0x401], 0x1}) r3 = socket(0x8, 0xc0806, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71356965742c747970653dbe"]) 03:43:38 executing program 0: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, &(0x7f0000001980)) fcntl$setpipe(r3, 0x407, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r7, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$VIDIOC_S_EXT_CTRLS(r6, 0xc0205648, &(0x7f0000000100)={0x9a0000, 0x10000, 0x4, r7, 0x0, &(0x7f00000000c0)={0x9a0919, 0x4, [], @value64=0x9}}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r8, 0x4008af60, &(0x7f0000000140)) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb}, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r2) r9 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$cgroup_type(r9, &(0x7f0000000200)='threaded\x00', 0x175d900f) 03:43:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x10000000000002) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_emit_ethernet(0xaa, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000540)={0x1, 0x3, [0x865, 0xbdd, 0xc74, 0x1ae]}) r6 = syz_genetlink_get_family_id$gtp(&(0x7f00000004c0)='gtp\x00') sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r6, 0x7d8102cc607edcab}, 0x14}}, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r11) r12 = getgid() chown(&(0x7f0000000080)='./file0/file0\x00', 0xee01, r12) fchown(r4, r11, r12) 03:43:38 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 284.304470] hfs: unable to parse mount options 03:43:38 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:38 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f00000026c0)}], 0x1) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 284.425698] ip_tables: iptables: counters copy to user failed while replacing table 03:43:39 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48}, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$update(0x2, r1, &(0x7f0000000c80)="df2be25e0a6325209417c54d89967396f0d8cca92257f9e18b1db59481c94a8b1ebc11acd68d54af5ada3810b5666668ca836294f4895f41c384cb8a7cf9c3168b33b546534e92c81744da6cfadeaa8a4d8bae885791d6d753f45ced8ef1f9f69b639fc9859f71a04340b07f31a39b548879560b3fce816f10461e8a6afe7798b1fe3f12d3eaa9c2279911fedf5b1eb0049c75deaec67a3f365705b2aa1dff28e17570ad53aae0a861ca2d70d167acb0ab22a7635174cdbed2b6106c1953da33dd2875de9f1fc0f41dd2cdec472a43979ce4", 0xd2) syz_mount_image$xfs(&(0x7f0000000680)='xfs\x00', &(0x7f0000000800)='./file0\x00', 0x5, 0xc48, &(0x7f0000000c00)=[{&(0x7f0000000880)="487e78d91c2fb1c93b1bada1c911c80e2d675d391bfbe6cdf9f10f83065a2ff1d0f3e233e6953361cdb9111fe174e2114808426d0b416629fc55ba03444842aa1640581a6706927d7f24d0063fbfef52434e39cd8d8fc0fbbc363114c10da481187f4355a373edc92e65379505e15166094384c58f70c97260173fc22fc3e8dc6850297fdc32821b8de13ba306e3510e68d431ffe99a22926e2278e10f0cda629f170b096ab06a29ae52759dfa0a8fcc9b014aadb3fe38dfa0a4125f3ec56dc5339504baabfafad5dff5797df216f2a4c499ea7071258618d11bd46fe99185d43d52bbb389a872c24c2e8027ddc679", 0xef}, {&(0x7f0000000980)="853013f0caf558a8f1adcd36142200469225b3990113569e279aa68ee2d6030117bf6f3c89fddac3a1e594825063b94ba9e9741c7d9dc6d7ee41b18c3efe5e1572c4bb9daf49b2db7c14a5def580fea06e4977859acf7513159e08bd5c890d1d0890090a24507b1b608d1c44ddb6620025503de90922f7301361fbabcd6f0047ef7bd81f4d935bf5eb151b24eebb4235383e", 0x92, 0xffffffffffffffe1}, {&(0x7f0000000a40)="517de589a6c032ab8c22f940fea02866fd4337a3b7a2fafb1204c879a3744f24013001e46f4bbb859d50ae6bd35502c60710c04d717af64851a15fb5970d352dc182e870d42b11ec60a4857ab84ce7a60993b6e357d25462b487bc7f97fdc9e06a1641f8631c57162acabc67a9c8298803e62689072ed168a7002ae878d23989bd3e9d", 0x83, 0xecc5}, {&(0x7f0000000b00)="5a4c3b2f019c7138c9fa6bfd9fb8123dc84f0837ad6fc35907bc401c02288f1f2ae3c2cc945c49f7a1dfb657330bbf986afe88cfcc35dca183217b3b28a2025e1d809678", 0x44, 0x3f}, {&(0x7f0000000b80)="43298ef5797ef8b148cd1e414c6d0f7c2722e354dddeb30533a8bd34ea3f2e073e06341e5d91f9fca85e3494e451f8ff2a130f74099eb984780625e403b2cbe1e89341ee62348bd3f89e74d82c10d4126cfbbbf3927aa5a3eead9eb1f31aa33200", 0x61, 0xd9ac}], 0x10000, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"]) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000001640)=ANY=[@ANYBLOB="0c05000000007c4fbfcda7e385a842dbe35268956202ab9df69a2b97b6f90c6238638de3ab8da63513394646e603cceecd168be44e91a550e22ed612aed0ac45b481cb79fe358e55b082da5a6540ab1c6aa1f6fe476f609a424eca9c1ef133b128e8d15a81975eef0aba8447f61f2bee91433809751cec31a7910b16f4a76c75700c8e502f218c3700f8c8d6b09221a3b3710f340bc738347ec1f9fb29a86b"], 0x1) add_key$user(&(0x7f0000001840)='user\x00', 0x0, &(0x7f00000028c0)="ac3fe44c2564fe4ddc71825cd410a6ba9eba95deb6381f78dd3f6b9d7aa195ac7e1496b4e62bb7be1b285c1200a9e3b0c949d41da08d2262f3bf99b8fbb2bd50199f2ee3765f3b22704d5451c610bdf35cd873db50e706cfa8973e595ce13deadb1121b393fe61cd9cc5b60cbe0d9e9ff777fa159390bf6b4c5cd91127bd4c96bef035a2e0bc98ddb5469bc1f508fbf0b5a90f4b15", 0x95, 0xfffffffffffffffe) 03:43:39 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) [ 284.550114] protocol 88fb is buggy, dev hsr_slave_0 [ 284.555372] protocol 88fb is buggy, dev hsr_slave_1 03:43:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f00000026c0)}], 0x1) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:39 executing program 2: listen(0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) socket$inet6_sctp(0xa, 0x0, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) fremovexattr(r1, &(0x7f0000000000)=@known='trusted.syz\x00') unshare(0x60020000) 03:43:39 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:39 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x22048002}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r1, 0x0, 0x0, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x6000081) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18d40100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r1, 0x2, 0x70bd2d, 0x25dfdc00, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xc433}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000010}, 0x4000000) r2 = socket(0x10, 0x80002, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCX25SCALLUSERDATA(r5, 0x89e5, &(0x7f0000000300)={0x3f, "607b1c0dfb58086806acf1b29989293d8ada70716e0db228775f120388cf195361db9c3094da60f1f1dd8bf9f09a7b1dc3deb2b85a1e4ba547ad34670f494935cf31fcf52b6f27ae03e2f8a76ff56fd7cba81e39280795475857e5586ba4d234a3f956fce19a0225ed657dae3c25949a8e6c2898a1ffb82bf3a7a68328d1b34f"}) 03:43:39 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) [ 284.750774] rdma_op ffff8880310b1b58 conn xmit_rdma (null) 03:43:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{&(0x7f00000026c0)}], 0x1) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) [ 284.812293] hfs: type requires a 4 character value 03:43:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffd23}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xa7f, 0xfffffcf1, &(0x7f00000000c0)="8ccf68605094547166f825f6c983", 0x0, 0xeec}, 0x28) [ 284.841752] hfs: unable to parse mount options 03:43:39 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:39 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x0, 0x0) dup2(r4, r3) [ 284.963070] hfs: type requires a 4 character value 03:43:39 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 284.993265] hfs: unable to parse mount options 03:43:39 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) 03:43:39 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fsync(r0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f00000000c0)={0x0, 0x4, 0x100a}) [ 285.211065] audit: type=1400 audit(1578800619.808:93): avc: denied { associate } for pid=12262 comm="syz-executor.0" name="file1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 285.244192] overlayfs: filesystem on './file0' not supported as upperdir 03:43:40 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='9p\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c00afc9ab5884f284340000000082c821776cc4ca27aa7ad007933ae19f4e6cac3584ddb027d42bef021f53d6ad974a823b754a94317f3766031ce8f83d6f6ac8e2b86fb0343e37152c6fb34ed1e4755d7a80399966cb4d7b203549acbc2731a40f3e866c9437223be7256ecc34dd0f5d4f433e0ff4ec1d9834ecbb73154fe3c178659a3f84f57670d37372d91ebcbe7357eacf9e1084277c9979c8f4932ef3aa628b97cb34ce23c1d84b375bbf43fb50b76ff67ac148bb6987a7482185a97f32b4"]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$USBDEVFS_GETDRIVER(r4, 0x41045508, &(0x7f0000000200)={0x1, "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"}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r9, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f0000000380)={r9, 0x10000, 0xbc, "2523e7276a4358d700cf1ddcd965f72d0ac89085dd728a6b6e383c6822283288fdfdf9845c40328a43a4a355f68b5705c73e094fe891c4addb782effc3e0b30aaf21d3a438d1f48f03edec8f4224dce7d86f6dc64d0d36bc61710753880981b64d87b392c1bde74734cc236a833da02b2b8bcdfe32988ee74d2f8c83ed8490a3e58531cb37caa885f6797163ae"}) getpeername$netlink(r5, &(0x7f0000000180), &(0x7f0000000340)=0xc) 03:43:40 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x800, 0x6000) ioctl$RTC_VL_CLR(r0, 0x7014) r1 = socket(0xf, 0x80000, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) 03:43:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x0, 0x0) dup2(r4, r3) 03:43:40 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:40 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) 03:43:40 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, r0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x40, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r2, 0x800000c0045002, &(0x7f00000000c0)) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000180)={0x8, 0x3, 0x4, 0x70000, 0x100, {0x0, 0x7530}, {0x4, 0x0, 0xc0, 0x3, 0x2, 0x3, "f38a2191"}, 0x2e2, 0x4, @planes=&(0x7f0000000140)={0x0, 0x81, @fd=r0, 0x5}, 0x9, 0x0, r1}) write$snddsp(r3, &(0x7f0000000280)="b1aac1fafbd84e99415a06b1e8361e5d05c52abca966985fbc01aca613a9f2ce7deb87e97c6c61927817865240760c39d26acf0c76ecbb37f2618de5c1b79c78542b1e636c906c78583be288e80a5395bbc4b22d6db513a9979d48ead2b82ba04be0582722ce854421d09b9a42c43048e6f159afc5f30f0dadd9d67b7a495b9b42c6a61d69bc5d3ae04c747973c39ec5271eb3c9d594ceb87c4a8b0994dfd1d94918f15e5a8c81fb2ed618fe9b737ec120cdf51fe3cdfc75", 0xb8) read$FUSE(r2, &(0x7f0000000380), 0x313) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) 03:43:40 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:40 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) [ 285.769600] hfs: type requires a 4 character value [ 285.790928] hfs: unable to parse mount options 03:43:40 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:40 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) 03:43:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x0, 0x0) dup2(r4, r3) [ 285.887033] hfs: type requires a 4 character value [ 285.898367] hfs: unable to parse mount options 03:43:40 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) 03:43:41 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) 03:43:41 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) socket$inet6(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r3) 03:43:41 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x3f, @empty, 0x4}, @in6={0xa, 0x4e21, 0x3ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}], 0x38) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r9, 0x4010ae67, &(0x7f0000000200)={0x2000, 0x11000}) ioctl$SNDCTL_DSP_GETOSPACE(r6, 0x8010500c, &(0x7f00000000c0)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r11, 0x8953, &(0x7f0000000100)={{}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) fstat(r11, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r10, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r12, @ANYBLOB="246673636f6e7465787400006e636f6e66696e6564940999ff4bdfbd20792ad44c3a6bd3e5f871ec", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fchown(r1, r3, r10) 03:43:41 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) socket(0x2, 0x800, 0x1) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x2, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000540)=0x37, 0x4) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xfffffffb, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9]}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000200)={0x2, 0x0, "4c7101c2585fbf4fdbf835edc021604b89ed522a0a937fd9e1a2ff42f05e5973", 0x5, 0xf6, 0x3, 0x7ff, 0x80}) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)={[0x6, 0xffff, 0x8, 0x5, 0x3, 0x2373, 0xfffffffffffffffb, 0x6, 0x0, 0x1ac7, 0x7f, 0xa1, 0x7, 0x9, 0xffffffffffff8001, 0xc87], 0xf000, 0x221000}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SVE_SET_VL(0x32, 0xbeec) getsockopt$sock_int(r3, 0x1, 0x2c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x715000}}}) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f0000000500)={0xffffffffffffffff, 0x3, 0x78, 0x1, 0x101}) 03:43:41 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x20000, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000040)) r1 = accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) setsockopt$sock_void(r1, 0x1, 0x4cba20f79cc68f33, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) fcntl$setown(r0, 0x8, r2) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000001c0)={0x9f0000, 0xf2a, 0x5, r1, 0x0, &(0x7f0000000180)={0x99096f, 0xe3bf, [], @p_u32=&(0x7f0000000140)=0x7}}) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000200)={0x1, 0x3, 0x2, 0x3, 0x9}) connect$netrom(r3, &(0x7f0000000240)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast]}, 0x48) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x140, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r4, 0x4142, 0x0) socketpair(0x35, 0xa, 0x4, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25SCAUSEDIAG(r5, 0x89ec, &(0x7f0000000340)={0x3, 0x4}) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380)={0x3, 0x8, 0x9, 0x81, 0x4, 0x20, 0x100}, 0xc) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r7, 0x4147, 0x0) r8 = gettid() ptrace$peek(0xffffffffffffffff, r8, &(0x7f0000000400)) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0)='nl80211\x00') r11 = accept$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000540)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000007c0)=0xe8) sendmsg$NL80211_CMD_LEAVE_MESH(r9, &(0x7f00000008c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x54, r10, 0x0, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8000}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r13}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) accept4$nfc_llcp(r7, &(0x7f0000000900), &(0x7f0000000980)=0x60, 0x81c00) ioctl$sock_bt_hci(r6, 0x400448e0, &(0x7f00000009c0)="f5394b4942dc45450ffca1cc8b47c5697cf7d4deb5b2ed28c80666ab33523420ab2f5a6d325551a15511a1880767bf587ed8805a7bb69fad46c3b62b0c16cc49013f340ec1193934d1ef9082e12042e354855d010a94e41a2184f25bdfc41b0122abb0b27ceaeb098e7513aac825019621fadbd5cba9c1d713f19390dc3628c16679af6dc2bfaa10f8e5c613d74ea600f91740c13b38a46977b77c1b55edb0169de8d23b1ff5cfe6275d7a9207b181470d619bc971111a870c68735f938bc64f8df99e054583a747d9a5624c9c5ab96b4615cbb8") ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000ac0)=0x1ff) r15 = dup3(0xffffffffffffffff, r11, 0x80000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r15, 0x800442d3, &(0x7f0000001d40)={0x5, 0x6, 0x1fb, @local, 'lo\x00'}) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000001d80)={0x18, 0x0, 0x3, {0x200}}, 0x18) 03:43:41 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:41 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) [ 286.675984] hfs: type requires a 4 character value 03:43:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) socket$inet6(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r3) [ 286.708905] hfs: unable to parse mount options 03:43:41 executing program 0: perf_event_open(&(0x7f0000001640)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0xffffffffffffffff, 0x0, 0xfffffc01) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000000, 0x0}}], 0xc6, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) [ 286.734556] use of bytesused == 0 is deprecated and will be removed in the future, 03:43:41 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 286.806369] use the actual size instead. 03:43:41 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) 03:43:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) socket$inet6(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r3) 03:43:41 executing program 2: gettid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(r0, &(0x7f0000000680)='cpuacct.usage_percpu\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = gettid() ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000004c0)) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_NET_NS_PID={0x8, 0x13, r6}, @IFLA_MAP={0x24}]}, 0x4c}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x100, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x3, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x5, 0x1, 0x2, 0x81}, &(0x7f0000000280)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0xcbd}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r6, r9, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00', r10}, 0x30) r11 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) openat$cgroup_int(r14, &(0x7f0000000500)='memory.high\x00', 0x2, 0x0) setsockopt$netrom_NETROM_T4(r11, 0x103, 0x6, &(0x7f0000000100), 0x4) getsockopt$netrom_NETROM_N2(r11, 0x103, 0x3, &(0x7f0000000440)=0x6a, &(0x7f0000000480)=0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) 03:43:41 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) 03:43:41 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:41 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffffffffffeea, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x4000, 0x3, 0x4, 0x1000, 0x4901, {0x0, 0x2710}, {0x5, 0x0, 0xfb, 0xfb, 0x1, 0x6, "99ff0fc2"}, 0x5, 0x3, @fd, 0xfffffffa, 0x0, r1}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000300)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000680)={0x140, 0x0, 0x10, 0x0, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:dmesg_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:mnt_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr="c877d817065689211b3f6cd073faf03d"}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'hsr0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x263, 0x7, 'system_u:object_r:cpu_online_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:agp_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_hsr\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:setrans_var_run_t:s0\x00'}]}, 0x140}, 0x1, 0x0, 0x0, 0x4004040}, 0x1) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8c00204}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r4, 0x108, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:dpkg_var_lib_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x3ba}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 03:43:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, 0xffffffffffffffff) [ 287.060659] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 03:43:41 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) 03:43:41 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) [ 287.164290] audit: type=1804 audit(1578800621.758:94): pid=12392 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir806513644/syzkaller.UchjYg/84/memory.events" dev="sda1" ino=16595 res=1 03:43:41 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 287.216238] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 03:43:41 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, 0xffffffffffffffff) 03:43:41 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r2, r3, 0x0) [ 287.297627] audit: type=1804 audit(1578800621.858:95): pid=12403 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir806513644/syzkaller.UchjYg/84/memory.events" dev="sda1" ino=16595 res=1 03:43:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b0000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f00000001c0)={0x5e, @empty, 0x4e22, 0x2, 'wrr\x00', 0x4, 0x9, 0x49}, 0x2c) recvmmsg(r2, &(0x7f0000003540)=[{{0x0, 0x2be, &(0x7f0000000300)=[{&(0x7f00000014c0)=""/4096, 0x1015}], 0xfffffffffffffcec, 0x0, 0x26a}}], 0x500, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9008000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3181}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_TRY_ENCODER_CMD(r6, 0xc028564e, &(0x7f0000000180)={0x0, 0xc275ef4d57fccb7a, [0xfffffffc, 0x5, 0x7, 0x226778c2, 0x5, 0x5, 0xe3e, 0x8]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r0, r1}) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1}, 0x0) sendmsg$rds(0xffffffffffffffff, 0x0, 0x0) 03:43:42 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:42 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, 0xffffffffffffffff) 03:43:42 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) [ 287.622708] IPVS: set_ctl: invalid protocol: 94 0.0.0.0:20002 03:43:42 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x80800, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000400)={0x0, 0x8, 0x4, 0x40000000, 0x9, {r1, r2/1000+10000}, {0x4, 0x8, 0x1f, 0x3, 0xac, 0x5, "6cbc7059"}, 0x8, 0x1, @planes=&(0x7f00000003c0)={0x8000, 0x0, @fd, 0x1ff}, 0x2, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0xc058534b, &(0x7f0000000480)={0xffffffff, 0x6, 0x4, 0x9, 0x7240, 0x9}) socket$inet(0xa, 0xa4a04c33cce6b429, 0x87) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dri(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80800) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x8d}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x6, 0x0, 0x0, 0x5}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x54477b7e36955ae2, 0x1, 0x7}, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x4, &(0x7f0000000540)={0x0, 0x989680}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040), 0x6e, 0x80004000) syz_open_procfs(0x0, &(0x7f0000000180)='auxv\x00') openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x4000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x20000, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="717569ff832c847970653dbe0fb49ae7f97efdc1a4c4a4a5be3667ad75f7ffffff124c7fa07e484a479f6bd9aa910c740d16f708ced178430c49"]) 03:43:42 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:42 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:42 executing program 0 (fault-call:8 fault-nth:0): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:42 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:42 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:42 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:42 executing program 4: r0 = socket(0x10, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r1, &(0x7f00000000c0)=0x4) [ 288.204439] hfs: unable to parse mount options 03:43:42 executing program 2: prctl$PR_CAPBSET_DROP(0x18, 0x21) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x0, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000040)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0xde1, 0x7, 0x4, 0x20000, 0x6, {r1, r2/1000+30000}, {0x3, 0x1, 0x0, 0x57, 0x6, 0x61, "ba8c56eb"}, 0x2, 0x7, @planes=&(0x7f00000000c0)={0xc, 0x3, @fd, 0xffffffff}, 0x9, 0x0, 0xffffffffffffffff}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000240)={0x0, 0xab, &(0x7f0000000180)="8435a5730f5c17582a16ae1a787bf685115858e095a23d91c46d0beddf62daf185bf58f96bf84af520542881b50b6b18499c7d2c40d426702fa28bcd4e8bdc4c6a165e101023d9fb8b62d54ef2e239fc141f50837c2969a6653499408a8243b2d6704564e3f6bf96508d0cdb3e8bb214904096fd6426a3f0fb0866afb557b1de85baa214586abd288c6c448ada85a23bfe66e04514f1cbabb4722601b4bf4965a97710dc82acd63b29a317"}) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x20}, 0x10) write$binfmt_elf64(r5, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x0, 0x7f, 0x0, 0x0, 0xd28b85cf70241221, 0x3c, 0x80000001, 0x2dc, 0x40, 0x110, 0x9, 0x100, 0x38, 0x1, 0x545b, 0x6, 0x3}, [{0x60000000, 0x5, 0x2, 0xa0, 0x0, 0x861b, 0xd6, 0x401}, {0x6474e551, 0x7, 0x80000001, 0x9, 0x81, 0xff, 0xfffffffffffffff9, 0xdebc}], "d424a04d7cdca219da4cc65ceda5a814885ec737f51e94c81d34bd80e74d458475b24c157175ea90cd31deaa6c60aa8c57a2be295ef23aa0131ec5bf55ab279ca308d4e71773370b2f597571caeb97232480d1d2aadbd0d2a10d53bc5aabc1c646a0", [[], [], [], [], [], [], []]}, 0x812) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000bc0)={0x5, 0x1, 0x4, 0x40000, 0x90, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x1f, 0x20, 0x1, "5fbcd8f9"}, 0xe69, 0x2, @planes=&(0x7f0000000b80)={0x80, 0xd, @userptr=0xa7, 0x5}, 0x7, 0x0, 0xffffffffffffffff}) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000c40)=""/145) socket$rxrpc(0x21, 0x2, 0xa) r7 = syz_open_dev$radio(&(0x7f0000000d00)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r7, 0xc0845658, &(0x7f0000000d40)={0x0, @bt={0x1000, 0xc1, 0x1, 0x0, 0x0, 0x8001, 0x5, 0x1, 0x8, 0x3, 0xffffe568, 0x8, 0x5, 0xeb8d, 0xe, 0x23, {0x7, 0x80000001}}}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000e00)={0x2, 'veth1_virt_wifi\x00', {0xffff10f3}, 0x3f}) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000e40)={0x20, 0x3, 0x8, 0x0, 0x400, 0x4, 0x40, 0xff, 0xeb, 0x29, 0x5, 0x2, 0x0, 0x80000, 0xc3, 0x40, 0x9, 0x1f, 0x3f, [], 0x5, 0xffff}) setxattr$trusted_overlay_nlink(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)='trusted.overlay.nlink\x00', &(0x7f0000000f00)={'U-', 0x6f24}, 0x16, 0x5) r8 = accept$inet6(0xffffffffffffffff, &(0x7f0000000f40), &(0x7f0000000f80)=0x1c) setsockopt$inet6_MRT6_ADD_MFC(r8, 0x29, 0xcc, &(0x7f0000000fc0)={{0xa, 0x4e24, 0x3, @loopback, 0x4}, {0xa, 0x4e23, 0x5, @local, 0x3}, 0x7, [0x93, 0x8, 0x0, 0x0, 0x1d38, 0x9, 0xfffffff7, 0x6]}, 0x5c) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001040)='/dev/vcs\x00', 0x48100, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000001080)=r9, 0x4) r10 = request_key(&(0x7f00000010c0)='id_legacy\x00', &(0x7f0000001100)={'syz', 0x2}, &(0x7f0000001140)='\\\x00', 0xfffffffffffffffa) r11 = add_key$user(&(0x7f00000011c0)='user\x00', &(0x7f0000001200)={'syz', 0x3}, &(0x7f0000001240)="b2a48749608335f072100251e9be6be50cff497a6f7f091b8bce51f5b294b31b4d7f53a339a2b7bec06e5895b31b1e751409b174ff407b1b8f72f8bb40de592dbb376c4f37d33b1ce946f695f2e473e9b6aa6392c16ad56004bbf8e780928250164797b46c0e8f656e70305faad82b66cdff45cd688620fc6f91fa783537a0e56d86b06577cead638cbe8c1217a609a966fd3bdded530f006a5a75b6a3cca2b9aab1d95f0aa5807dcf084dec4a4efeaf23c4ba882f9aa2df36acedc84816932d08b0e8c85766d90464a3950dbc81e4f1c77ab88f", 0xd4, 0xfffffffffffffffa) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r10, &(0x7f0000001180)='rxrpc_s\x00', &(0x7f0000001340)=@keyring={'key_or_keyring:', r11}) r12 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001380)='/dev/ttyS3\x00', 0x80440, 0x0) fsetxattr$security_capability(r12, &(0x7f00000013c0)='security.capability\x00', &(0x7f0000001400)=@v2={0x2000000, [{0x55, 0x401}, {0xa65, 0xffff}]}, 0x14, 0x4) r13 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001440)='/dev/autofs\x00', 0x432000, 0x0) bind$rds(r13, &(0x7f0000001480)={0x2, 0x4e23, @empty}, 0x10) clock_gettime(0x0, &(0x7f00000014c0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000001500)={0xa2a, 0x1, 0x4, 0xe000, 0x4, {r14, r15/1000+10000}, {0x5, 0x8, 0xb8, 0x9, 0x0, 0x50, "de71a0d3"}, 0x6c, 0x4, @userptr=0x1, 0x7ff, 0x0, 0xffffffffffffffff}) write$UHID_DESTROY(r16, &(0x7f0000001580), 0x4) [ 288.273456] hfs: unable to parse mount options [ 288.292548] IPVS: set_ctl: invalid protocol: 94 0.0.0.0:20002 03:43:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000880)='/dev/fuse\x00', 0x2, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2c, &(0x7f0000000140), &(0x7f00000001c0)=0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = fcntl$getown(r2, 0x9) r4 = syz_open_procfs(r3, &(0x7f0000000540)='mountinfo\x00') r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x40000, 0x0) ioctl$KVM_TRANSLATE(r5, 0xc018ae85, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f00000002c0)) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x3, 0x4c8, 0x9]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0x8001}) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0xa) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x1, 0x0) 03:43:42 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000100), 0x4) splice(r2, &(0x7f0000000000)=0x20, r1, &(0x7f0000000040)=0x4, 0x6, 0x5) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r4, &(0x7f0000000380), 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) dup2(r5, r4) 03:43:42 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:42 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:42 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB='quiet,type=>']) 03:43:43 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:43 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 288.422039] hfs: type requires a 4 character value [ 288.427025] hfs: unable to parse mount options 03:43:43 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) getrandom(&(0x7f0000000000)=""/187, 0xbb, 0x2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x145106, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) dup2(r4, r3) [ 288.515910] hfs: type requires a 4 character value 03:43:43 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x101100) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r3 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000200)={'ip6gre0\x00', {0x2, 0x4e20, @broadcast}}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400283}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r4, 0x400, 0x70bd29, 0x0, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast2, 0x8800, 0x0, 'sh\x00', 0x0, 0x10001, 0x66}, 0x2c) r5 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x9f2}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r5, &(0x7f0000007e00), 0x400000000000058, 0x0) r6 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x101, 0x100) socket$inet(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40)={r10}, 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000880)=ANY=[@ANYRES32=r10, @ANYBLOB="0004673f7b0bb40006000000b5e19518537f63e6b94de35ac2fd24c2c1f0faf3d837e53f3e947fc2ef0a57e52a0913972d9ab037940407e23444dcb509cde65b4666acc9bb860db184fbb36abece16651d65ecc456047817547f6cef7480d463f8819e8c706863a4105ac2b7821de6b2c6c069573618ac08697c88eed0900584a20e57bacc51f83720d27e26df2d826f398f201d85eede0a"], &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000100)={r10, 0xcf8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r10, 0x6}, 0x8) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r12, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r13 = syz_open_procfs(0x0, &(0x7f0000000340)='auxv\x00') preadv(r13, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) close(r12) r14 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r14, &(0x7f0000000040)={0xa, 0x4e22, 0x1ff, @dev, 0x6}, 0x1c) splice(r11, 0x0, r12, 0x0, 0x100000002, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='net/sockstat\x00') 03:43:43 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) [ 288.563065] hfs: unable to parse mount options 03:43:43 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x43732e5398416f1a}) ioctl$TUNSETTXFILTER(r0, 0x401054d6, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0xba, &(0x7f0000000140)="18af38996f44fc7ba3f9e81126c38343f39c4f214951d4a9bd19568cabf49e50decdbc1a7cf4f6d9e3245b57cf4b48d14a8394de128dcefcee34545e67802bea97f821ce3414e5015aa02f19db15d11b57e33b975a18a910acda73b82e91dd4397a85d43bb8fe98b27c1312a54463c73b33dbb9176f7f2214b7e3f85037cad3403454701fc4baf9e7125cab49bd4f7cb07bc6410cd92a31c0c04c456fd14a5be977f504716df8c49f4784c54a2f0bef5b93d97c5cb4aa3f57a82", 0x81, 0x0, &(0x7f0000000200)="d3b7e4c49d0947f66d664d65ddd29f9617b11273a63de0ef69750aa906fce426a835f4208cabe59dd444f14b720f7775e221a38462709e2656fe4a5e7c61c9300776c6ab4e7778a481db90a1756e4174c1f6c862ec3e8c9117963093ed901c0c49239a94ea9bd1e19aee46bfd68595b8558296916448e1bca28a3b46f19b7beced"}) 03:43:43 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)={0x0, @adiantum}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100), 0x4) write$binfmt_misc(r1, &(0x7f0000000000)={'syz0', "4609a9c7bd3cc1590c62c2b3ec9201f11d4b6d40b2f7a3cbb7938e0091ee370903dcf0ec"}, 0x28) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) 03:43:43 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:43 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x40) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000001880)=[{&(0x7f0000000080)="9f1a820653c3d386d9139dcdde4c2c7ec10f4bac4b7b0614e157e0c814b2a938ac5ea79c3b4f884e11ef1a0e0222c1341addf9faa875eb7b2390af8189f422182dfba151c7ba782ae7567df57e177a7c54f7e49dc0567a20", 0xfffffeee}, {&(0x7f0000000280)="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", 0xfd}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000001940)="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", 0xd2}, {&(0x7f00000014c0)="c2905613a30fea3b32ca749cf8c690199381438db1310d4b439773942d2f0a1d70b0b7929e83b0871d3854622c6e4cce6acfb12e537789a8b2e78a45bfbe91ebcab9b24d69e7bfe890d927aaac8210e8d2fd988f3f089fc36e33b95cb748fb4e1dcaa5469870e775c94aab1e5b577ada931b5866979f70563685f0d44db56c2d2f5c4cdaf1c060bb20ef83bc896b44b47d45af681e99c0d70220b38a481286b4a66e1ef89010f6026010ee15558bb29d2fff3b45c61be07993e5798aa3a0ce1d91db8bb92d4022cdb9987cb62754e17ea4cadceba8afab2accee9958f3c6cc4969240124ab3cdc00455f5f6a7645c0e1", 0xf0}, {&(0x7f0000000100)="d237c8844bd198dcff9997329a7ae56a3fb595cfa39e05c099888f85baefca3ed5d21925aa383489cf672ca239ffba2d3210ad9a068f1895934b1cef68ecba7c7cfb8e247668426f3a97ca56ee6ba2f91a6551df5d01416526eae2550ca43ccacf57a0f29b5cb45b56242c63403f07a353074e02b2bfcc133a9a3b073991c5aa623b11680f1c5c4ac1e48d", 0x8b}, {&(0x7f00000015c0)="a9b6c7cddb09d16c08ac87d1cd1285879bcec90f5d2c3f58e786273bf7b2305dad119d860939ba2661c8946e171de17cdc4b03077faa7cd4c551e2fc4d2f4883367dd80e4d34d1b707f28a6dacc076518606f849a56417424040e053396f7e4ee3bb08ebcdb910c28d36dc54b75ef1f3d09ac4e966e2b6b626559da93309a418ee8e30c7f560c0ab4a1a3062bce5b2d06b0d853c539aed526fcac2b18880d4513af81bd17e4812dc4c0ea4e8d14d4be8d4b614805d35c7735d3646db7536ec8f7bb563e3bd459f9d00e60e41c4fc560a23bd9c62a2", 0xd5}, {&(0x7f00000016c0)="98de3b9817d3189dfb4f6edf41dc2466d051531db446f7c283945485159a464933614169a45978ea495748e6ec99854771be772f315bcd7c86d7093e5784bbb8f74e6b4663b9dd3f39e937b1ce46bd187f9133aa4be0842df63c51a525cda7eddfbe7fdd6a653aac2223e374eef573c67fe4ac3a7627c363dc9d15787ea46a57a8dc3f40dad9efd39d61f8b9aa618507c6fcca4c97eeedc3fe4bd9a1aba5bb3176187eefda6c056011c82ad5e06843c7a53bab285cd038a45334554ca86ef3a624d4bed031da778e5b253ac65f215386ce26f1169206259e2d25a1", 0xdb}, {&(0x7f00000017c0)="140176a5026bb41bb770e9f862505c5d7a26d2c7ac8b9c569c121a4dec2b67091737790080a6745e763b756373323246798d9b3166cb1dd1c2e2dcd0218704ec1559efa0b880c0ee45b1f0b6a4011f1b295edec7ac5d590d453367c653d70a6201c8b7ab5641861fc76f76a13d5a1db586fc1e1e394e9c705d1a0a0940d7a36aa27273d6b5600d8c1f8bd04a449fa8d78d74011959bbe5a4f7ff56845ff5dcfd11d01040c83a9d24fd", 0xa9}], 0x9) r4 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x9f2}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) r5 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x101, 0x100) r6 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001b40)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000880)=ANY=[@ANYRES32=r7, @ANYBLOB="0004673f7b0bb40006000000b5e19518537f63e6b94de35ac2fd24c2c1f0faf3d837e53f3e947fc2ef0a57e52a0913972d9ab037940407e23444dcb509cde65b4666acc9bb860db184fbb36abece16651d65ecc456047817547f6cef7480d463f8819e8c706863a4105ac2b7821de6b2c6c069573618ac08697c88eed0900584a20e57bacc51f83720d27e26df2d826f398f201d85eede0a"], &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000100)={r7, 0xcf8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r7, 0xffff, 0xe74}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000380)={0x8000, 0x1, 0x4, 0x3, r8}, 0x10) r9 = socket$inet6(0xa, 0x1, 0x0) dup2(r9, r3) [ 288.752464] hfs: unable to parse mount options 03:43:43 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400500, 0x0) getpid() r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fd8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x39d) 03:43:43 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, 0x0, 0x0) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:43 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) [ 288.871492] hfs: unable to parse mount options 03:43:43 executing program 0: arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r3 = socket$inet6(0xa, 0x1, 0x0) dup2(r3, r2) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)={0x0, 0xffff}, &(0x7f0000000080)=0x8) 03:43:43 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RSTATFS(r3, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x6, 0x9, 0x3f, 0x0, 0x1, 0x2, 0x1000, 0x8000, 0x8}}, 0x43) 03:43:43 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:43 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 289.063098] hfs: type requires a 4 character value 03:43:43 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x80}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0xfffffffd, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000000600)=ANY=[@ANYBLOB="18000000", @ANYRES16=r5, @ANYBLOB="0100100000000000000014000000040007003d0fbac1a5ed03d68d7da890ac6106955b3bd804d1e4bfb7232bbdab121e2644151b5e173c566d9d00000080de79685e066e7f6a9025fa6283d9494959e1ca74b77415a96ef812e4f44f1347f89e99bd61733beac2c669ce82e8cea3858ade02128bbe200aae4fac4d35e62097c352b066768964e87baebe089845052337798bc19383237d73e6aec78feca0a1ae14bda10174cbd2a1c481ee96c952cc319ce5f4395389781afc63cce382d80b686da0ff2d4b9369ec6758bb89f649a4c355cd8ee7705e946a521f63bbd3bd50cba246ebe1c9c51d0a392574b646f3239bae5c343c12beca6a44"], 0x3}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1020008}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000480}, 0x18040000) openat$userio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/userio\x00', 0x400, 0x0) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r6, 0x103, 0x6, &(0x7f0000000100), 0x4) fcntl$setpipe(r6, 0x407, 0xffffffffffffffff) clock_gettime(0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, 0x0, 0xfffffffffffffd52) write(r3, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) socket$inet_sctp(0x2, 0x5, 0x84) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab64}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000bc0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000380)=[@in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e21, 0xff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7ff}], 0x2c) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r7, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r7, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r7, 0x1) recvmsg(r7, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xfedc, 0x7115}, 0x100) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000140)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) [ 289.096770] hfs: unable to parse mount options 03:43:43 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) [ 289.185987] hfs: type requires a 4 character value [ 289.196963] hfs: unable to parse mount options 03:43:43 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:43 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="030060020000000000000065"]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat(r3, &(0x7f0000000000)='./file0\x00', 0x0, 0x20) 03:43:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000100)={0xffff, 0x9, 0x4, 0x2, 0x7f}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x848400, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_client='access=client'}, {@access_any='access=any'}]}}) 03:43:43 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:44 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = dup(0xffffffffffffffff) setsockopt$packet_int(r6, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r7 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r7}, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x880c, 0x0, 0x61, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r9, 0x10, &(0x7f0000000580)={0x0, 0x0}) r11 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r11, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="00eb8000000000020001", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942ac650306152e474b", @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRESHEX=r5], 0x7, 0x1) r12 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r12, 0x89a2, &(0x7f0000000180)={'\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r14 = gettid() waitid(0x83b895581628fca4, r14, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r12, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r13, @ANYRESDEC=r14]], 0xfffffffffffffe56}}, 0x20004850) r15 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r16 = dup2(0xffffffffffffffff, r15) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r16, 0xc08c5332, &(0x7f0000000900)={0x0, 0x0, 0x0, 'queue1\x00'}) r17 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r17) r18 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r18, &(0x7f0000000000)=[{&(0x7f0000000100)}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x24}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r18, 0x227d, &(0x7f0000000780)) kcmp(r17, 0x0, 0x0, 0xffffffffffffffff, r18) ptrace$setopts(0x4206, r17, 0x0, 0x0) r19 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r17, r19, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r14, r16, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r10, r11, 0x0, 0x1, &(0x7f0000000080)='\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r7, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r20}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r21, r6, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, r4, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r20}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000000)='/dev/ttyS3\x00', r20}, 0x30) fcntl$dupfd(r22, 0x0, r0) r23 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r23, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r24 = socket$inet6(0xa, 0x1, 0x0) dup2(r24, r23) [ 289.406342] hfs: unable to parse mount options 03:43:44 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:44 executing program 3: r0 = perf_event_open(&(0x7f0000002240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000001c0)={0x3, 0x2, 0x4, 0x1000000, 0x1d38, {r2, r3/1000+10000}, {0x3, 0x8, 0x1f, 0x2, 0x8, 0x9, "3ff51705"}, 0x47, 0x1, @planes=&(0x7f0000000180)={0x100, 0xffffffff, @fd, 0x10000}, 0x80000000, 0x0, r4}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001740)=0x0) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = gettid() sendmsg$nl_route(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_NET_NS_PID={0x8, 0x13, r10}, @IFLA_MAP={0x24}]}, 0x4c}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = gettid() sendmsg$nl_route(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4c00000010000100"/20, @ANYRES32=r12, @ANYBLOB="000000000000000008001300", @ANYRES32=r14, @ANYBLOB="24000e00000000000000000000000300"/36], 0x4c}}, 0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r16) r17 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r17, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000002080)='/selinux/validatetrans\x00', 0x1, 0x0) r18 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r18, 0x103, 0x6, &(0x7f0000000100), 0x4) r19 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r19, 0x103, 0x6, &(0x7f0000000100), 0x4) r20 = signalfd4(r1, &(0x7f00000020c0), 0x8, 0x0) r21 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r21, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r23 = socket$nl_route(0x10, 0x3, 0x0) r24 = gettid() r25 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r25, 0x103, 0x6, &(0x7f0000000100), 0x4) r26 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r26, 0x103, 0x6, &(0x7f0000000100), 0x4) r27 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r27, 0x103, 0x6, &(0x7f0000000100), 0x4) r28 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r28, 0x103, 0x6, &(0x7f0000000100), 0x4) r29 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r29, 0x103, 0x6, &(0x7f0000000100), 0x4) r30 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r30, 0x103, 0x6, &(0x7f0000000100), 0x4) r31 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r31, 0x103, 0x6, &(0x7f0000000100), 0x4) sendmsg$nl_route(r23, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000024c0)=ANY=[@ANYPTR=&(0x7f0000002300)=ANY=[@ANYRESDEC=r25, @ANYRES16=r31, @ANYPTR64=&(0x7f00000022c0)=ANY=[], @ANYRESDEC=r26], @ANYRES32=r22, @ANYRESDEC=r30, @ANYRES32=r24, @ANYPTR64=&(0x7f0000002380)=ANY=[@ANYRESHEX=r27, @ANYRESHEX=0x0, @ANYPTR64=&(0x7f0000002340)=ANY=[], @ANYRES64=0x0, @ANYBLOB="e06f6a8cba05b812ce4cc71602135bf76ac4a30a71e846201fc2a817ab762573875d0804816655c49cfc6776fec61a45b31a6451223c96d1a1fbd8e37555b8723893c6f8b7d0cad1a29bdf3bb00335f1bd2e9c6f0c513094e92e56d9fcd7b83e77481c9ac899643bc1f28255de2c8efc347eadd1824deca6bd7031972d2f881c3424e534fc5b7c0f12cbce9c9b853d40b0ffc61d377ff34d2e00756d7f1e6f079b3e8aa80e7e966366d91a55bd14674767704f26ce13474ffac75ad91958b778a9830048554658403583ef785553e9f5e0bb00d5c6fa2243f238", @ANYRES16=r28, @ANYRES16=r29]], 0x5}}, 0x0) r32 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r33) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r35 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r35, 0x8953, &(0x7f0000000100)={{}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) fstat(r35, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r34, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r36, @ANYBLOB="246673636f6e7465787400006e636f6e66696e6564940999ff4bdfbd20792ad44c3a6bd3e5f871ec", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000240)=@kern={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000002000)=[{&(0x7f0000000280)={0x1270, 0x10, 0x400, 0x70bd27, 0x8, "", [@typed={0xc, 0x1c, 0x0, 0x0, @u64=0x9}, @typed={0xc, 0x18, 0x0, 0x0, @u64=0x3}, @generic="09009b9c5cd5cc5495e367f69c877e5d783c2b9440988215dda808aa1011d83df1a542961ce8605838f2e81c0f0b5adceb25c1d738c558d5e92449de12c791d6b7faed8f821ddf25c6180b08ae287615a5bd40a2a01aec151bb3927c99a90f5c568685de2b2a3b48e94b5c52a620a6245ae8082dfaa7b084f615a93b5a70a8f93db32678d7a8f886449d610a9d07d29f6ba3e738994763e4eeb674c256a56af4194ce00dfad4a0fdf98889d9338c1dd28e05027c0868a7cf32dcf56a4780bd21ebfa593b55b5d81b8d424444344cceb0ffc7cb6a2d4ad4d7ce2cfcefe070329c32b49bce05e3e5fcc603a41cf3", @generic="60bbca5c62f9a1823909523120bc8e17cadde056bc537715e38dc4001dee6e5db7e0aedf798bb62957f9", @nested={0x111a, 0x96, 0x0, 0x1, [@generic="0f8dab7b30374332c957e3dd1781e550daaceaf2240ac0d058222df0eb99a3ef3affd6c90cd11a902b9dd04559e524b659047418d227ca6240e86917e3b8877cbea8e36daa9312cb1f6304a0cebcdc6995f12cc4d311736f6b6bb690ae2c9c3804a5e8496ab804063640c89ea9aa7987ca6b1b4d", @typed={0x8, 0x55, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x15}}, @typed={0x8, 0x75, 0x0, 0x0, @fd=r0}, @generic="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", @generic="2e4351dfbf3b94b4acbdb5ef090275d68688e877b6fd861a3529b82f5be942861166db7fd5ed4c8d3a3916bb136bbb08d7085f40c37a9e8bc979bb884e14f41c769589d3e93977cf2d5a6efce827c09e68873762694ff7c776e54cd1d2c5e5f27e0ab9bda9e7077c557edd0ff25d85a2a16d90eb6aa36bfa38ff91930d4b8c5b3051be96eef51c2886de6c7bbe3b3ac567f8"]}, @nested={0x12, 0x16e, 0x0, 0x1, [@generic="9ff8fd338559b34e52fd", @typed={0x4, 0x79}]}]}, 0x1270}, {&(0x7f0000001500)={0x21c, 0x35, 0x400, 0x70bd26, 0x25dfdbfd, "", [@nested={0x17a, 0x4f, 0x0, 0x1, [@generic="d71464d074807e5cbc0186532a19cca95c49fdda77321e75894d5d6d0030e4b32c04cc0a3ddc2fa883ea9d0f72cc0cd92ea20d946aaeea41439e2e42cea2d4426af227ec0bfe319edd61edd5c0b4b4cd92d8ea241c94db9abfdd5f50fcda8087e0348a1b4291436fbff991cc3a2823beb8c698e530f4b1b6b8d97c9036313ff2df", @generic="31cb1f61c48b9f0859393f95ae1af0a2a2d1b8dfe6947b50507801971d69878a4c9c2befec48e945518a6246d5e5d0a42b2e07f578401203a923d718f6a602415111080c592e686dfe5e493a8ad747d0c3fb847edfe70c6cdbc17ffd8c75b7c2df0638db2b", @typed={0x8e, 0x5, 0x0, 0x0, @binary="5f3163168534849b1f3f429795ffd05de63b44cbfc8c8d3c24c75535d338d323d698e8b9f6cbf03ebd9006a3a4ae4b256d55e5a358f3378d5c289cb0c09b76dc4b5fd3170ba1189907c395afbc0c5b72801290da85f499719a125fa855c72d29e9eb45c8052692d7528cd8a1801a0a776051631b54c29b93dc2266de674c1c4986e3222ffa8d4678f8de"}]}, @generic="6db56096c660ea6f4dc805e37798a69f36b2d82d429250fba819d6f97aaa31f9a36133071aca348a", @generic="a301e125fed826c0b873abf95f2ffca56f0db2666a5ec737da798e6fa8eabb8cf5c05bcbc6b54136e5c37d3b592ce75dea72318c6fe8835206a5da52120bd70113f230c5cfca200c61dd375fbfe7c2fbd874827b4b12fec991dc57cb4a", @typed={0x8, 0x20, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x1c}}]}, 0x21c}, {&(0x7f0000001780)={0x4d4, 0x1c, 0x800, 0x70bd2c, 0x25dfdbfd, "", [@generic="5093cf132fad28e4e3e7e7a39c0b1f18430311d74a589232fe531be9740d263caea845a8474e5851aba4fbe9229e5b913c95d6dab079c1c2cc78904e6bab7189f9792f660ccc0a001285d10cb5d54ea61d57f920c79bf72f389aa3546274b510e2a8368300248898e2f75fe2d3933ef38e5544f0d603b22fe19a5114be704da0354551e4f86af3fbe1966ab126c7e2d663bf691e43da576e0bb9814f6b4721bdc0e0bc8f525549", @nested={0x92, 0x53, 0x0, 0x1, [@generic="0464d4a37fa672707c92624daf1d1fb218b3655eec407e34a5b86626077b77f48b250172b4b46fc1f15a777e9893974a09a5362e703029fdf19aaf4091cd22bff9d4481e694b0aa8d3f93c00f931f388fad24c0e17cf1b99459e64f90682f7e6986331c30323297e389bdc7cfe7f47ddd4d7", @typed={0xc, 0x3b, 0x0, 0x0, @u64=0x3ff}, @typed={0x6, 0x7e, 0x0, 0x0, @str='@\x00'}, @generic, @typed={0x8, 0x6e, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @nested={0x2f6, 0x94, 0x0, 0x1, [@typed={0x14, 0x43, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic="b96045989e450c04012f7b0b8c9727196881df86b06cf3bfa9326c62364e8e40e7d6d4a4711dcef628ce18702a9855667ff3422b828b216efebb034a1605aaed23b3d3386bef6db33058a2da36642fd51cf8d9d96bd909e59fad314a2774d96de5d6bbc3ff7b01245c597d7e4f38da63594c8b408af9abab8956e54e8522711d3d0b434bdaedf9bb5e1580d40c2e30bf01bda906332946778f025b4077d97b82cd0ae462f50e1acf6d80b565226607ef5a84a504e9ccbdcae0fc3039412aedf25959dbe1bb0ba32b99ec1aaec4e2985c9c136fe9c93b4031789f997dad72e1", @typed={0x8, 0x20, 0x0, 0x0, @fd=r0}, @typed={0x69, 0x8e, 0x0, 0x0, @binary="4f873f75354de1796203e758f29fbe7fda4b2aba69d9075b6abd9c536cdbec958510567f754dea86c3f1c5cb5f07bb0953a58860ae72cbd4aab8724a8a42cd810c418cea8017cac464828151d14e423da45befddfab685674d89bec8efc9f07a6baa81b914"}, @generic="97c57413218b33438b29b113320b358273c8a09e3b0f1896f3aca1d4cfa9fcbe94fd736f4e414c828f427018ee5a946c2cdaa8e322bb4c50711a700f652069c4ab34bbc2667e55f376592fe6d4aac28a905fda2de4bafa9e39642adc335afce7c7d197e07ad2f710b1522d23002456aed46ce5", @generic="148be496e6bbf7e10b5ccabd3efe76b4f4d88b05df255d97ebb46db2536865d9f40b16dd0a120545f96536f21a39197897193f14488c78889eae86e6c4883e7e6cc6a4ee0e8956795fd2dd6273fd3a6bde5c9df124328f8e990d469421387c30848d5c066aa8349ef6b2bef4b4e4ac7bda308b73a7ce2aafd45282b4bfecf89184144f239355cb73528bee43fb5687a1851202999a1338c80c19a60328aa62afcb1b1a5fce223001015d508c38cb379175978935d72460f118fa799847", @typed={0xc, 0x19, 0x0, 0x0, @u64=0x9}, @generic="519068484af3dce86e050971dd7fe23640ec3aca311c2e62d5ce1ee30edd2965be1e54ebc5a4b5d5de05853dac201c02ecef351cf49d0811f9e0b4c45441f185df7d16498d9d1a", @typed={0x8, 0x6c, 0x0, 0x0, @pid=r6}]}, @typed={0x8, 0x52, 0x0, 0x0, @uid=0xee01}, @typed={0x5, 0x1f, 0x0, 0x0, @str='\x00'}, @nested={0x74, 0x6a, 0x0, 0x1, [@generic="6f1b104ad8908bb7fb1a7c13c5d37dfcad406a8cbf883e59dbf1832c2017c41a34", @generic="66d85521312e962c4521723fc744bc3f7e282aeec0890fa5f8c93090dc98f80587508321d72a8ed779adbe31fe07382cca8c2ba2cde9734be89359bad8791d6017a1009b89e27269ccc7da852dcfe8"]}, @nested={0xc, 0x85, 0x0, 0x1, [@typed={0x8, 0x62, 0x0, 0x0, @pid=r10}]}]}, 0x4d4}, {&(0x7f0000001c80)={0x4c, 0x35, 0x0, 0x70bd2d, 0x25dfdbff, "", [@typed={0x5, 0x34, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x27, 0x0, 0x0, @ipv6=@rand_addr="104a943ba110e94f3881c2f40f3aded2"}, @typed={0x8, 0x74, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x12, 0x0, 0x0, @pid=r14}, @typed={0x8, 0x22, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x95, 0x0, 0x0, @uid=0xee00}]}, 0x4c}, {&(0x7f0000001d00)={0xa8, 0x3b, 0x100, 0x70bd29, 0x25dfdbfd, "", [@typed={0x8, 0x40, 0x0, 0x0, @uid=r16}, @generic="67b6476b70ae803c45357ce2efd1e397e986b4675691f25dce92146ece22677175f4ae25870e3b4037e4342afe0a69f3469a", @generic="92eb7d7d4c08fcac83a3688853f58bce4dcb5089b3fac56d4b61ef139d53b60e4fe947d3f97abb536cedd676a8ba4ecfbdb2b8d578994fde0b806b1cee2f24461d1d8be825f87883f9811d90169d91a103c5d233bf80fcb9cc701ac33a"]}, 0xa8}, {&(0x7f0000001dc0)={0x224, 0x15, 0x1, 0x70bd2b, 0x25dfdbfe, "", [@generic="16e024fc6fcda8ab02c5685b897dfeefc57a2da82bc6c46cb5fc6447640cc953de27d0381c642edb3001dd033efb6c833e58496cfc2aa75e87606ff4c9069aff267a24ab9df38fe8556e", @generic="a1644193d6ac53f12ea38791a551176a272d3e2425f22afbea76d3d5641bfac9c8d956840687f16616f4dfd7e461c7c0e33a828f276e9b6c4b0498aa256c23cb6ef3b38018c279638d5bec03da8918616bb26884992c95f73c2a239119d60af6730a071fb07c167310e08742aa043b2612a316d0f61774256d5e405db7819045aa75b5d5275cdae44d69b78625ea516a1df0f1203db1ed6ca471f3ac90d31bd9e99835cd19339550622704c5f0cf23b91e5008431a7127c67e7932a0ba413e19c9c42899dd36863787b9464a487d73d5eb487981f3199d085c6e1448ab3c9fe1850d0238e5ca55", @typed={0xc, 0x8a, 0x0, 0x0, @u64=0x9}, @typed={0xcc, 0x28, 0x0, 0x0, @binary="0e32fa1c51304b8ebde1e51a224b9dae5309eaade87243ef05d6597e5cc97a6c6f73031229a2230a03573c73b17aa3d22a962b56166428a928d01eaa284dcc869763aa3c8644ecf1316def082364a39b73b7211e3dff3acdcd79729e1a1ecc059c43787870580dfbc6dbd90bf38dd418d3a7656dae1a5719d35d8e83190b7f1b9f8260ae952491e27f9aaf9ebc4fed28b96dd0cbe6048f2197d50e86784416c97f3a37f5faa6a75641663bd9acd220d041e539a9fbfd3fac2290a7f4c6b0fe6941e578374faa390a"}, @typed={0x8, 0x2d, 0x0, 0x0, @ipv4=@loopback}]}, 0x224}], 0x6, &(0x7f0000002100)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r20]}}, @cred={{0x1c, 0x1, 0x2, {r24, r33, r34}}}], 0x48, 0x40000}, 0x4000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000004119eba995f3538d5c25f05a4a9df752f910a161a77dd4f80063a5ca4233ba01a240c6712fe6eb20398a3b1df442a2c8f9d0fc7bcb181f5e847e8ac700"/80, @ANYRES32=0x0, @ANYBLOB="000008001b0000000000000000f23fad"], 0x28}}, 0x0) [ 289.470258] hfs: unable to parse mount options 03:43:44 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:44 executing program 2: syz_open_dev$audion(&(0x7f0000000800)='/dev/audio#\x00', 0x800000000000000, 0x397280) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r1 = socket$inet6(0xa, 0x3, 0x5) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x4) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_procfs(0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000240)={'syz0\x00', {0x0, 0x0, 0x7ff}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x45c) sched_setattr(0x0, &(0x7f0000000840)={0x30, 0x1, 0x1, 0x0, 0x3}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$bt_l2cap(r6, &(0x7f0000000100)={0x1f, 0x7b7, {0x1, 0x9, 0x3, 0x1, 0x1}, 0x4, 0x40}, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getpeername$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) write$cgroup_pid(r8, &(0x7f0000000000), 0xfffffea6) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) close(r9) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="b8e3ed841959c2a6d852de69dd96300100ddda62709886781bb34d9e5fba27b594ba16b5dd7a"], &(0x7f000095dffc)=0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r9, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x98) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x1ff, 0x0) getpid() [ 289.510916] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 03:43:44 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:44 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) [ 289.566921] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 03:43:44 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, 0x0) dup3(r3, r4, 0x0) [ 289.658589] selinux_nlmsg_perm: 167 callbacks suppressed [ 289.658600] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16640 sclass=netlink_route_socket pig=12632 comm=syz-executor.3 [ 289.691644] hfs: type requires a 4 character value 03:43:44 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 289.705626] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 289.720298] hfs: unable to parse mount options [ 289.831600] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 289.864374] hfs: type requires a 4 character value [ 289.871661] hfs: unable to parse mount options 03:43:44 executing program 3: r0 = perf_event_open(&(0x7f0000002240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000001c0)={0x3, 0x2, 0x4, 0x1000000, 0x1d38, {r2, r3/1000+10000}, {0x3, 0x8, 0x1f, 0x2, 0x8, 0x9, "3ff51705"}, 0x47, 0x1, @planes=&(0x7f0000000180)={0x100, 0xffffffff, @fd, 0x10000}, 0x80000000, 0x0, r4}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001740)=0x0) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = gettid() sendmsg$nl_route(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_NET_NS_PID={0x8, 0x13, r10}, @IFLA_MAP={0x24}]}, 0x4c}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = gettid() sendmsg$nl_route(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4c00000010000100"/20, @ANYRES32=r12, @ANYBLOB="000000000000000008001300", @ANYRES32=r14, @ANYBLOB="24000e00000000000000000000000300"/36], 0x4c}}, 0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r16) r17 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r17, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000002080)='/selinux/validatetrans\x00', 0x1, 0x0) r18 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r18, 0x103, 0x6, &(0x7f0000000100), 0x4) r19 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r19, 0x103, 0x6, &(0x7f0000000100), 0x4) r20 = signalfd4(r1, &(0x7f00000020c0), 0x8, 0x0) r21 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r21, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r23 = socket$nl_route(0x10, 0x3, 0x0) r24 = gettid() r25 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r25, 0x103, 0x6, &(0x7f0000000100), 0x4) r26 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r26, 0x103, 0x6, &(0x7f0000000100), 0x4) r27 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r27, 0x103, 0x6, &(0x7f0000000100), 0x4) r28 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r28, 0x103, 0x6, &(0x7f0000000100), 0x4) r29 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r29, 0x103, 0x6, &(0x7f0000000100), 0x4) r30 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r30, 0x103, 0x6, &(0x7f0000000100), 0x4) r31 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r31, 0x103, 0x6, &(0x7f0000000100), 0x4) sendmsg$nl_route(r23, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000024c0)=ANY=[@ANYPTR=&(0x7f0000002300)=ANY=[@ANYRESDEC=r25, @ANYRES16=r31, @ANYPTR64=&(0x7f00000022c0)=ANY=[], @ANYRESDEC=r26], @ANYRES32=r22, @ANYRESDEC=r30, @ANYRES32=r24, @ANYPTR64=&(0x7f0000002380)=ANY=[@ANYRESHEX=r27, @ANYRESHEX=0x0, @ANYPTR64=&(0x7f0000002340)=ANY=[], @ANYRES64=0x0, @ANYBLOB="e06f6a8cba05b812ce4cc71602135bf76ac4a30a71e846201fc2a817ab762573875d0804816655c49cfc6776fec61a45b31a6451223c96d1a1fbd8e37555b8723893c6f8b7d0cad1a29bdf3bb00335f1bd2e9c6f0c513094e92e56d9fcd7b83e77481c9ac899643bc1f28255de2c8efc347eadd1824deca6bd7031972d2f881c3424e534fc5b7c0f12cbce9c9b853d40b0ffc61d377ff34d2e00756d7f1e6f079b3e8aa80e7e966366d91a55bd14674767704f26ce13474ffac75ad91958b778a9830048554658403583ef785553e9f5e0bb00d5c6fa2243f238", @ANYRES16=r28, @ANYRES16=r29]], 0x5}}, 0x0) r32 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r33) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r35 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r35, 0x8953, &(0x7f0000000100)={{}, {}, 0x8, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) fstat(r35, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000400)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x8048, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r34, @ANYBLOB=',allow_other,mask=MAY_WRITE,seclabel,euid=', @ANYRESDEC=r36, @ANYBLOB="246673636f6e7465787400006e636f6e66696e6564940999ff4bdfbd20792ad44c3a6bd3e5f871ec", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) sendmsg$netlink(r5, &(0x7f0000002180)={&(0x7f0000000240)=@kern={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000002000)=[{&(0x7f0000000280)={0x1270, 0x10, 0x400, 0x70bd27, 0x8, "", [@typed={0xc, 0x1c, 0x0, 0x0, @u64=0x9}, @typed={0xc, 0x18, 0x0, 0x0, @u64=0x3}, @generic="09009b9c5cd5cc5495e367f69c877e5d783c2b9440988215dda808aa1011d83df1a542961ce8605838f2e81c0f0b5adceb25c1d738c558d5e92449de12c791d6b7faed8f821ddf25c6180b08ae287615a5bd40a2a01aec151bb3927c99a90f5c568685de2b2a3b48e94b5c52a620a6245ae8082dfaa7b084f615a93b5a70a8f93db32678d7a8f886449d610a9d07d29f6ba3e738994763e4eeb674c256a56af4194ce00dfad4a0fdf98889d9338c1dd28e05027c0868a7cf32dcf56a4780bd21ebfa593b55b5d81b8d424444344cceb0ffc7cb6a2d4ad4d7ce2cfcefe070329c32b49bce05e3e5fcc603a41cf3", @generic="60bbca5c62f9a1823909523120bc8e17cadde056bc537715e38dc4001dee6e5db7e0aedf798bb62957f9", @nested={0x111a, 0x96, 0x0, 0x1, [@generic="0f8dab7b30374332c957e3dd1781e550daaceaf2240ac0d058222df0eb99a3ef3affd6c90cd11a902b9dd04559e524b659047418d227ca6240e86917e3b8877cbea8e36daa9312cb1f6304a0cebcdc6995f12cc4d311736f6b6bb690ae2c9c3804a5e8496ab804063640c89ea9aa7987ca6b1b4d", @typed={0x8, 0x55, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x15}}, @typed={0x8, 0x75, 0x0, 0x0, @fd=r0}, @generic="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", @generic="2e4351dfbf3b94b4acbdb5ef090275d68688e877b6fd861a3529b82f5be942861166db7fd5ed4c8d3a3916bb136bbb08d7085f40c37a9e8bc979bb884e14f41c769589d3e93977cf2d5a6efce827c09e68873762694ff7c776e54cd1d2c5e5f27e0ab9bda9e7077c557edd0ff25d85a2a16d90eb6aa36bfa38ff91930d4b8c5b3051be96eef51c2886de6c7bbe3b3ac567f8"]}, @nested={0x12, 0x16e, 0x0, 0x1, [@generic="9ff8fd338559b34e52fd", @typed={0x4, 0x79}]}]}, 0x1270}, {&(0x7f0000001500)={0x21c, 0x35, 0x400, 0x70bd26, 0x25dfdbfd, "", [@nested={0x17a, 0x4f, 0x0, 0x1, [@generic="d71464d074807e5cbc0186532a19cca95c49fdda77321e75894d5d6d0030e4b32c04cc0a3ddc2fa883ea9d0f72cc0cd92ea20d946aaeea41439e2e42cea2d4426af227ec0bfe319edd61edd5c0b4b4cd92d8ea241c94db9abfdd5f50fcda8087e0348a1b4291436fbff991cc3a2823beb8c698e530f4b1b6b8d97c9036313ff2df", @generic="31cb1f61c48b9f0859393f95ae1af0a2a2d1b8dfe6947b50507801971d69878a4c9c2befec48e945518a6246d5e5d0a42b2e07f578401203a923d718f6a602415111080c592e686dfe5e493a8ad747d0c3fb847edfe70c6cdbc17ffd8c75b7c2df0638db2b", @typed={0x8e, 0x5, 0x0, 0x0, @binary="5f3163168534849b1f3f429795ffd05de63b44cbfc8c8d3c24c75535d338d323d698e8b9f6cbf03ebd9006a3a4ae4b256d55e5a358f3378d5c289cb0c09b76dc4b5fd3170ba1189907c395afbc0c5b72801290da85f499719a125fa855c72d29e9eb45c8052692d7528cd8a1801a0a776051631b54c29b93dc2266de674c1c4986e3222ffa8d4678f8de"}]}, @generic="6db56096c660ea6f4dc805e37798a69f36b2d82d429250fba819d6f97aaa31f9a36133071aca348a", @generic="a301e125fed826c0b873abf95f2ffca56f0db2666a5ec737da798e6fa8eabb8cf5c05bcbc6b54136e5c37d3b592ce75dea72318c6fe8835206a5da52120bd70113f230c5cfca200c61dd375fbfe7c2fbd874827b4b12fec991dc57cb4a", @typed={0x8, 0x20, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x1c}}]}, 0x21c}, {&(0x7f0000001780)={0x4d4, 0x1c, 0x800, 0x70bd2c, 0x25dfdbfd, "", [@generic="5093cf132fad28e4e3e7e7a39c0b1f18430311d74a589232fe531be9740d263caea845a8474e5851aba4fbe9229e5b913c95d6dab079c1c2cc78904e6bab7189f9792f660ccc0a001285d10cb5d54ea61d57f920c79bf72f389aa3546274b510e2a8368300248898e2f75fe2d3933ef38e5544f0d603b22fe19a5114be704da0354551e4f86af3fbe1966ab126c7e2d663bf691e43da576e0bb9814f6b4721bdc0e0bc8f525549", @nested={0x92, 0x53, 0x0, 0x1, [@generic="0464d4a37fa672707c92624daf1d1fb218b3655eec407e34a5b86626077b77f48b250172b4b46fc1f15a777e9893974a09a5362e703029fdf19aaf4091cd22bff9d4481e694b0aa8d3f93c00f931f388fad24c0e17cf1b99459e64f90682f7e6986331c30323297e389bdc7cfe7f47ddd4d7", @typed={0xc, 0x3b, 0x0, 0x0, @u64=0x3ff}, @typed={0x6, 0x7e, 0x0, 0x0, @str='@\x00'}, @generic, @typed={0x8, 0x6e, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @nested={0x2f6, 0x94, 0x0, 0x1, [@typed={0x14, 0x43, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic="b96045989e450c04012f7b0b8c9727196881df86b06cf3bfa9326c62364e8e40e7d6d4a4711dcef628ce18702a9855667ff3422b828b216efebb034a1605aaed23b3d3386bef6db33058a2da36642fd51cf8d9d96bd909e59fad314a2774d96de5d6bbc3ff7b01245c597d7e4f38da63594c8b408af9abab8956e54e8522711d3d0b434bdaedf9bb5e1580d40c2e30bf01bda906332946778f025b4077d97b82cd0ae462f50e1acf6d80b565226607ef5a84a504e9ccbdcae0fc3039412aedf25959dbe1bb0ba32b99ec1aaec4e2985c9c136fe9c93b4031789f997dad72e1", @typed={0x8, 0x20, 0x0, 0x0, @fd=r0}, @typed={0x69, 0x8e, 0x0, 0x0, @binary="4f873f75354de1796203e758f29fbe7fda4b2aba69d9075b6abd9c536cdbec958510567f754dea86c3f1c5cb5f07bb0953a58860ae72cbd4aab8724a8a42cd810c418cea8017cac464828151d14e423da45befddfab685674d89bec8efc9f07a6baa81b914"}, @generic="97c57413218b33438b29b113320b358273c8a09e3b0f1896f3aca1d4cfa9fcbe94fd736f4e414c828f427018ee5a946c2cdaa8e322bb4c50711a700f652069c4ab34bbc2667e55f376592fe6d4aac28a905fda2de4bafa9e39642adc335afce7c7d197e07ad2f710b1522d23002456aed46ce5", @generic="148be496e6bbf7e10b5ccabd3efe76b4f4d88b05df255d97ebb46db2536865d9f40b16dd0a120545f96536f21a39197897193f14488c78889eae86e6c4883e7e6cc6a4ee0e8956795fd2dd6273fd3a6bde5c9df124328f8e990d469421387c30848d5c066aa8349ef6b2bef4b4e4ac7bda308b73a7ce2aafd45282b4bfecf89184144f239355cb73528bee43fb5687a1851202999a1338c80c19a60328aa62afcb1b1a5fce223001015d508c38cb379175978935d72460f118fa799847", @typed={0xc, 0x19, 0x0, 0x0, @u64=0x9}, @generic="519068484af3dce86e050971dd7fe23640ec3aca311c2e62d5ce1ee30edd2965be1e54ebc5a4b5d5de05853dac201c02ecef351cf49d0811f9e0b4c45441f185df7d16498d9d1a", @typed={0x8, 0x6c, 0x0, 0x0, @pid=r6}]}, @typed={0x8, 0x52, 0x0, 0x0, @uid=0xee01}, @typed={0x5, 0x1f, 0x0, 0x0, @str='\x00'}, @nested={0x74, 0x6a, 0x0, 0x1, [@generic="6f1b104ad8908bb7fb1a7c13c5d37dfcad406a8cbf883e59dbf1832c2017c41a34", @generic="66d85521312e962c4521723fc744bc3f7e282aeec0890fa5f8c93090dc98f80587508321d72a8ed779adbe31fe07382cca8c2ba2cde9734be89359bad8791d6017a1009b89e27269ccc7da852dcfe8"]}, @nested={0xc, 0x85, 0x0, 0x1, [@typed={0x8, 0x62, 0x0, 0x0, @pid=r10}]}]}, 0x4d4}, {&(0x7f0000001c80)={0x4c, 0x35, 0x0, 0x70bd2d, 0x25dfdbff, "", [@typed={0x5, 0x34, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x27, 0x0, 0x0, @ipv6=@rand_addr="104a943ba110e94f3881c2f40f3aded2"}, @typed={0x8, 0x74, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x12, 0x0, 0x0, @pid=r14}, @typed={0x8, 0x22, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x95, 0x0, 0x0, @uid=0xee00}]}, 0x4c}, {&(0x7f0000001d00)={0xa8, 0x3b, 0x100, 0x70bd29, 0x25dfdbfd, "", [@typed={0x8, 0x40, 0x0, 0x0, @uid=r16}, @generic="67b6476b70ae803c45357ce2efd1e397e986b4675691f25dce92146ece22677175f4ae25870e3b4037e4342afe0a69f3469a", @generic="92eb7d7d4c08fcac83a3688853f58bce4dcb5089b3fac56d4b61ef139d53b60e4fe947d3f97abb536cedd676a8ba4ecfbdb2b8d578994fde0b806b1cee2f24461d1d8be825f87883f9811d90169d91a103c5d233bf80fcb9cc701ac33a"]}, 0xa8}, {&(0x7f0000001dc0)={0x224, 0x15, 0x1, 0x70bd2b, 0x25dfdbfe, "", [@generic="16e024fc6fcda8ab02c5685b897dfeefc57a2da82bc6c46cb5fc6447640cc953de27d0381c642edb3001dd033efb6c833e58496cfc2aa75e87606ff4c9069aff267a24ab9df38fe8556e", @generic="a1644193d6ac53f12ea38791a551176a272d3e2425f22afbea76d3d5641bfac9c8d956840687f16616f4dfd7e461c7c0e33a828f276e9b6c4b0498aa256c23cb6ef3b38018c279638d5bec03da8918616bb26884992c95f73c2a239119d60af6730a071fb07c167310e08742aa043b2612a316d0f61774256d5e405db7819045aa75b5d5275cdae44d69b78625ea516a1df0f1203db1ed6ca471f3ac90d31bd9e99835cd19339550622704c5f0cf23b91e5008431a7127c67e7932a0ba413e19c9c42899dd36863787b9464a487d73d5eb487981f3199d085c6e1448ab3c9fe1850d0238e5ca55", @typed={0xc, 0x8a, 0x0, 0x0, @u64=0x9}, @typed={0xcc, 0x28, 0x0, 0x0, @binary="0e32fa1c51304b8ebde1e51a224b9dae5309eaade87243ef05d6597e5cc97a6c6f73031229a2230a03573c73b17aa3d22a962b56166428a928d01eaa284dcc869763aa3c8644ecf1316def082364a39b73b7211e3dff3acdcd79729e1a1ecc059c43787870580dfbc6dbd90bf38dd418d3a7656dae1a5719d35d8e83190b7f1b9f8260ae952491e27f9aaf9ebc4fed28b96dd0cbe6048f2197d50e86784416c97f3a37f5faa6a75641663bd9acd220d041e539a9fbfd3fac2290a7f4c6b0fe6941e578374faa390a"}, @typed={0x8, 0x2d, 0x0, 0x0, @ipv4=@loopback}]}, 0x224}], 0x6, &(0x7f0000002100)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [r20]}}, @cred={{0x1c, 0x1, 0x2, {r24, r33, r34}}}], 0x48, 0x40000}, 0x4000000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000004119eba995f3538d5c25f05a4a9df752f910a161a77dd4f80063a5ca4233ba01a240c6712fe6eb20398a3b1df442a2c8f9d0fc7bcb181f5e847e8ac700"/80, @ANYRES32=0x0, @ANYBLOB="000008001b0000000000000000f23fad"], 0x28}}, 0x0) 03:43:44 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, 0x0) dup3(r3, r4, 0x0) [ 289.876709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16640 sclass=netlink_route_socket pig=12656 comm=syz-executor.3 [ 289.920410] protocol 88fb is buggy, dev hsr_slave_0 [ 289.925503] protocol 88fb is buggy, dev hsr_slave_1 03:43:44 executing program 2: mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r6, 0x103, 0x6, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000880)={r6}) r8 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/access\x00', 0x2, 0x0) dup2(r7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r9 = accept$ax25(0xffffffffffffffff, &(0x7f0000000200)={{0x3, @null}, [@remote, @default, @rose, @bcast, @netrom, @default, @null, @bcast]}, &(0x7f0000000000)=0x48) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f00000005c0)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r9, &(0x7f0000000440)={0x2001}) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) socket$tipc(0x1e, 0x7, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000006c0)=""/141) mount(&(0x7f0000000600)=ANY=[@ANYBLOB="487f38f188faeac4fa8e8331601a1507f9b06598ab62f7a9913eba8047c25e6dc56949c3186b20e4e0324d06f3bd5b91c0b53b9c514b4e1dd505ea4b4be43002831f0ea21b58c0d9f371553fa682846648a51b41f63823aa2c25ab293e06de9edfd086c67bcbfe1569c78771b7a180d7242f7a1a6bb9e6bcf3219c4509a268aaba8ffbf80b853a9f072b11505e0e"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="d13a422fbace9aa5fb2d35fb194eae313a29fe7c7c600b639b29966ee53344ef3fd6a028403dc6717ac6db87e0e020b3dbdbfff3c0de0a6ea5635a2fc4238099e7d0257e6db351fc9d09f482272f2ac4b4c060c9f31994583a1a37b895bdf67287e2da9b0e3ada57a9a42d67a0dacbfe72435a540ee3ce38d24535aee119fe64cb96199a3bd9a23ab8c9ac7dd31ae84606ed8c52de8edc3132c4eb51600d1da0e250dc91d0fd78e9e72d47dbd04f3277735bd56e7c4b9ab026f071c54af881dcbde66208802cb400000000000000"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r10, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x271}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000004c0)=""/242, 0xb0}, {&(0x7f0000001380)=""/233, 0xfc36}], 0x4c, 0x0) [ 290.034204] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 290.091513] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 290.160103] protocol 88fb is buggy, dev hsr_slave_0 [ 290.165260] protocol 88fb is buggy, dev hsr_slave_1 03:43:44 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, 0x0) dup3(r3, r4, 0x0) 03:43:44 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x800799c) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r6, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r7 = socket$inet6(0xa, 0x1, 0x0) dup2(r7, r6) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:44 executing program 4: sendto$ax25(0xffffffffffffffff, &(0x7f0000000000)="25ea619a10182f81d79849fdc0bdc3a3a0aeafc92d4d29b9a874fa3b7c98d87bff2d2a162fd30ec0447fcd45b9a5f3d6f1717a4d674c4a2460d01e044e5b4b4e3278fbd0f9afc5bc583c99598d26ebf09fc4fc32439e74f2f8b1e3feb874df9b", 0x60, 0x4000, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x7d9d03f703653ebe, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = dup(0xffffffffffffffff) setsockopt$packet_int(r8, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r9 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r9}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r11, 0x10, &(0x7f0000000580)={0x0, 0x0}) r13 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r13, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="00eb8000000000020001", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306152e474b", @ANYBLOB="00af908aa8001f63da5e800000002c", @ANYRES32=0x0, @ANYRESHEX=r7], 0x7, 0x1) r14 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r14, 0x89a2, &(0x7f0000000180)={'\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r16 = gettid() waitid(0x83b895581628fca4, r16, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r14, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r15, @ANYRESDEC=r16]], 0xfffffffffffffe56}}, 0x20004850) r17 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r18 = dup2(0xffffffffffffffff, r17) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r18, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r19 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r19) r20 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) writev(r20, &(0x7f0000000000)=[{&(0x7f0000000100)}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x24}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r20, 0x227d, &(0x7f0000000780)) kcmp(r19, 0x0, 0x0, 0xffffffffffffffff, r20) ptrace$setopts(0x4206, r19, 0x0, 0x0) r21 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x2}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r19, r21, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r22}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r16, r18, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r22}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r22}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r22}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r22}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r22}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r12, r13, 0x0, 0x1, &(0x7f0000000080)='\x00', r22}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r10, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r22}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r22}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r22}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r9, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', r22}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)={r22}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r23, r8, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00', r22}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r7, r6, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r22}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r4, r5, 0x0, 0x1, &(0x7f00000002c0)='\x00', r22}, 0x30) accept4$phonet_pipe(r3, &(0x7f0000000100), &(0x7f0000000140)=0x10, 0x800) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="79756965742c7479708739be"]) 03:43:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="000000000f0500000018e523b4e90cb87a7f54af1f09fdf91150d8f93aaad0243d629582ada0d1eead3cadf602ad42b0fe7143fdfbbb05df37e35f8a70884c1c248677d3d9c504f1252a82364cc2e64ba4bd4f8f18d30cecc60e7ffbd92267db18b7e436981f79cf5eed91805a8b1f7bd38e25f5b78b9f6e6775", @ANYRES16=r1, @ANYBLOB="010f00000000000000000b000000240001000800020000000000e3dd56478f7690f2396c08000000000800010000000000"], 0x4c}}, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="0000000027a31ca7414989a8f4182d9cff2621b424ea71290d886a42ef107594b78281065cfb1b5e42d0c60f938a613b81b014d0ae4f8bc21dfd1780cff34d004a45f6a0a4e3875da1c23211337041f833d0559b874667805f2d3cb1d2addbd2953ce3dd7a36"], 0x1}}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast1}}}, 0x88) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x14ec) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) socket$inet(0x10, 0x2, 0x6) syz_open_procfs(0x0, 0x0) r2 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x201040, 0x128) fchdir(r2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f0000000540)={0x1, 0x1000000000005}) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000500)={0x1, 'syz1\x00'}) fchdir(0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000440)=""/90) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = gettid() sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_NET_NS_PID={0x8, 0x13, r7}, @IFLA_MAP={0x24}]}, 0x4c}}, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x9, 0xfffc}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r8, 0x2402, 0xf17) unshare(0x40040400) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x300, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r10 = accept$ax25(r9, 0x0, &(0x7f00000000c0)) fsetxattr$trusted_overlay_opaque(r10, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x453ca55e1dbe1c9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xc0000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 290.229165] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16640 sclass=netlink_route_socket pig=12679 comm=syz-executor.3 03:43:44 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f00000000c0)="0fb1a83412bb48ee89de107e85b589241d112f4b5c6f8e6ffe4bb9341ab1a08977d0b70cbc2e2c01747321e11501411445ae62534f03e19d9521fe20e7975d367a7d9257122957bea1b39b834799642e6043ff2cf29ce716a092e107947b2dee9a39615f81c7ca01546632418039775733f035257b27e5e4fd9f3a953ada13fe34199c41e0e40947da1c9ab40285b47dbc376ee9d6cdf979539d1fd6a3c3fe1de9ce57e3f868e9ca592f3e4b3025800200e2bd91dc41731c35346d329193a9d72d6b67597aaa2464e77f5c38c0a4b68526d21ae845f62d8050c615dc28a602b6421453dd", 0xe4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) writev(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, 0xffffffffffffffff) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x240, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000040)) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r7) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r9) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r11) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r14) getresuid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r17) fsetxattr$system_posix_acl(r4, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="02000000010001000000000002000700", @ANYRES32=r7, @ANYBLOB="02000400", @ANYRES32=r9, @ANYBLOB="02000400", @ANYRES32=r11, @ANYBLOB="20020002", @ANYRES32=r12, @ANYBLOB="02000500", @ANYRES32=r14, @ANYBLOB="02000200", @ANYRES32=r15, @ANYBLOB="02000100", @ANYRES32=r17, @ANYBLOB="040005000000000008000900", @ANYRES32, @ANYBLOB="10000000000000002000060000000000"], 0x64, 0x1) 03:43:44 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(0xffffffffffffffff, r3, 0x0) 03:43:44 executing program 3: epoll_create1(0x40000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000180)='./file0\x00', 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000140)='dummy0\x00', 0x7) r4 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000340)) chdir(&(0x7f0000000300)='./file0\x00') r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r5, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'dummy0\x00', {0x2, 0x0, @loopback}}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x15) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x242000, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r7, 0x103, 0x6, &(0x7f0000000100), 0x4) r8 = dup(0xffffffffffffffff) write$FUSE_BMAP(r8, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f00000000c0)={0x30}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:43:44 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, 0x0) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:45 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x6668bcb8e62c5689, 0x0) writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r3) 03:43:45 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(0xffffffffffffffff, r3, 0x0) 03:43:45 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000100), 0x4) r4 = dup3(0xffffffffffffffff, r3, 0x79c72e7370a04600) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8982, 0x0) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r5, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r6 = socket$inet6(0xa, 0x1, 0x0) dup2(r6, r5) 03:43:45 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, 0x0) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 290.492979] IPVS: ftp: loaded support on port[0] = 21 03:43:45 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(0xffffffffffffffff, r3, 0x0) 03:43:45 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, 0x0) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:45 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYRES32=r0]) [ 290.956047] hfs: unable to parse mount options [ 291.019935] hfs: unable to parse mount options 03:43:45 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r3, &(0x7f0000000000)=[{0x0}, {&(0x7f00000026c0)}], 0x2) r4 = socket$inet6(0xa, 0x1, 0x0) dup2(r4, r2) 03:43:45 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, 0xffffffffffffffff, 0x0) 03:43:45 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:45 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$RTC_UIE_OFF(r2, 0x7004) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x48020, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000080)={r5}) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000100)={r5, 0x42972f0d5d4b6c47}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f00000001c0)={r5, &(0x7f0000000140)=""/109}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$FUSE_BMAP(r6, &(0x7f00000000c0)={0x18, 0x0, 0x1, {0x2}}, 0x18) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100), 0x4) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0xf, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000003000050ad22780648c6394fb0107fc001007b8400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 03:43:45 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="71756965742c747970653dbe"]) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101240, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f00000000c0)={0x59, &(0x7f0000000040)="bcb0106294af837bd7fe7c0ea379ff36beeb3bfb965cdf4c18c5acc20789c368761aea0b06e432111323a92e1f0f2d95fcd4c6dd83a8d9f88e1580c8bd7a777f9fe002c13864bfda41496769a9e45c37bf7f4babcaab1a4b45"}) 03:43:45 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, 0xffffffffffffffff, 0x0) [ 291.251753] hfs: type requires a 4 character value 03:43:45 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000100), 0x4) fcntl$setstatus(r2, 0x4, 0xc00) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) writev(r4, &(0x7f0000000380), 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) dup2(r5, r4) 03:43:45 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) [ 291.305779] hfs: unable to parse mount options 03:43:45 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, 0xffffffffffffffff, 0x0) 03:43:46 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="717569659ac1d6742c747970653dbe"]) [ 291.387391] hfs: type requires a 4 character value [ 291.397004] hfs: unable to parse mount options [ 291.412140] device bridge_slave_1 left promiscuous mode [ 291.418576] bridge0: port 2(bridge_slave_1) entered disabled state 03:43:46 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}}) ftruncate(0xffffffffffffffff, 0x800799c) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:46 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x10000000c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x5, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={0x0, 0x0, r7}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x18, 0x3, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x1, 0xb, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001440)={0x0, 0x0, 0x8001, 0xd2e}, 0x10, r7, r6}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r5, 0x10, &(0x7f0000000000)={&(0x7f0000000140)=""/210, 0xd2, r7}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r8, 0x1) close(r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r10, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e24, 0x5, @loopback, 0x7f}, {0xa, 0x4e21, 0x8ca7, @ipv4={[], [], @remote}, 0x100}, 0x400, [0x8, 0x4, 0x1, 0x8, 0x3, 0x8, 0xfffffffd, 0x200]}, 0x5c) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r11, 0x5423, &(0x7f0000000040)=0x5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup3(r12, r13, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r15, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xc0000001, 0x0, 0x0, 0xe1) [ 291.514549] device bridge_slave_0 left promiscuous mode [ 291.535120] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.550661] hfs: unable to parse mount options [ 291.615898] device veth1_vlan left promiscuous mode [ 291.630046] device veth0_vlan left promiscuous mode [ 291.863153] device hsr_slave_1 left promiscuous mode [ 291.904062] device hsr_slave_0 left promiscuous mode [ 291.944248] team0 (unregistering): Port device team_slave_1 removed [ 291.966116] team0 (unregistering): Port device team_slave_0 removed [ 292.000111] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 292.054208] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 292.174766] bond0 (unregistering): Released all slaves [ 292.247601] mkiss: ax0: crc mode is auto. [ 292.269945] hfs: unable to parse mount options 03:43:46 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) mkdir(&(0x7f0000001380)='./file0\x00', 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f0000000580)={0x8, '\x00', {'veth0_to_team\x00'}, 0xc947}) ftruncate(0xffffffffffffffff, 0x0) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r7, &(0x7f0000000380)=[{0x0}, {&(0x7f00000026c0)="4e7e263d468215ed41ac8bbf062392bd3c5dd35300d8ee592d9df70ca72cec492dfdfa1494fbae001f5f8631618cbd84c9d80d5baf4839b9f4211322f3fd3c2e780ca444b7a866a71563271cd19f39befcb524f225421eae3ebaaee297bd2c6068b82d2e3474166c97514d9d3260a0ecdcd74c4ebd4699a1edb46593e0ddf3a5347f251778281b1fecfb79d1edf0c8d6e5a6eb8ead6ed68ad1403626bd59ef966e767c534b2281dcf59961b44687e002d7fdebb85359c053e7a65adc5b8614dae0df32c806f9753ce7ed889507945d673b6330c6ba1208b07cd5", 0xda}], 0x2) r8 = socket$inet6(0xa, 0x1, 0x0) dup2(r8, r7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000380)='./bus\x00', 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a027fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006081000418e00000004", 0x56}], 0x1) 03:43:46 executing program 5 (fault-call:8 fault-nth:0): fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) dup3(r3, r4, 0x0) 03:43:46 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db505db9bcfe8696071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x49, 0x0, 0x3040800, &(0x7f0000000000)=ANY=[@ANYBLOB="71757d17c07b090038d3f61e0523a16965711651aa19df8175b4e172490e"]) [ 292.422258] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 292.433895] ------------[ cut here ]------------ [ 292.438679] WARNING: CPU: 1 PID: 2338 at lib/debugobjects.c:287 debug_print_object.cold+0xa7/0xdb [ 292.447687] Kernel panic - not syncing: panic_on_warn set ... [ 292.447687] [ 292.455052] CPU: 1 PID: 2338 Comm: kworker/u4:4 Not tainted 4.14.163-syzkaller #0 [ 292.462672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.472035] Workqueue: netns cleanup_net [ 292.476098] Call Trace: [ 292.478692] dump_stack+0x142/0x197 [ 292.482457] panic+0x1f9/0x42d [ 292.485655] ? add_taint.cold+0x16/0x16 [ 292.489636] ? debug_print_object.cold+0xa7/0xdb [ 292.494404] ? debug_print_object.cold+0xa7/0xdb [ 292.499157] __warn.cold+0x2f/0x2f [ 292.502682] ? ist_end_non_atomic+0x10/0x10 [ 292.506983] ? debug_print_object.cold+0xa7/0xdb [ 292.511720] report_bug+0x216/0x254 [ 292.515335] do_error_trap+0x1bb/0x310 [ 292.519475] ? math_error+0x360/0x360 [ 292.523261] ? vprintk_emit+0x171/0x600 [ 292.527275] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.532118] do_invalid_op+0x1b/0x20 [ 292.535811] invalid_op+0x1b/0x40 [ 292.539258] RIP: 0010:debug_print_object.cold+0xa7/0xdb [ 292.544599] RSP: 0018:ffff8880a1baf858 EFLAGS: 00010082 [ 292.549947] RAX: 0000000000000061 RBX: 0000000000000003 RCX: 0000000000000000 [ 292.557195] RDX: 0000000000000000 RSI: ffffffff86cc2fe0 RDI: ffffed1014375f01 [ 292.565397] RBP: ffff8880a1baf880 R08: 0000000000000061 R09: 0000000000000000 [ 292.572643] R10: 0000000000000000 R11: ffff8880a1ba03c0 R12: ffffffff86cbe260 [ 292.579887] R13: ffffffff813d6f70 R14: 0000000000000000 R15: ffff88805408e640 [ 292.587155] ? work_on_cpu_safe+0x80/0x80 [ 292.591347] ? debug_print_object.cold+0xa7/0xdb [ 292.596131] debug_check_no_obj_freed+0x3f5/0x7b7 [ 292.601058] ? free_obj_work+0x6d0/0x6d0 [ 292.605104] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 292.610552] kfree+0xbd/0x270 [ 292.613645] ? xps_cpus_show+0x600/0x600 [ 292.617686] kvfree+0x4d/0x60 [ 292.620771] netdev_freemem+0x4c/0x60 [ 292.624549] netdev_release+0x72/0x90 [ 292.628327] device_release+0x163/0x1a0 [ 292.632290] ? dev_attr_show+0xc0/0xc0 [ 292.636156] kobject_put+0x14e/0x210 [ 292.639846] ? batadv_get_drvinfo+0x140/0x140 [ 292.644333] netdev_run_todo+0x4e4/0x770 [ 292.648383] ? br_dev_open+0x70/0x70 [ 292.652082] ? netdev_info+0xf0/0xf0 [ 292.655770] ? register_netdev+0x30/0x30 [ 292.659808] ? unregister_netdevice_queue+0x196/0x230 [ 292.665019] rtnl_unlock+0xe/0x10 [ 292.668447] default_device_exit_batch+0x328/0x3d0 [ 292.673363] ? unregister_netdevice_many+0x50/0x50 [ 292.678277] ? rtnl_unlock+0xe/0x10 [ 292.681881] ? do_wait_intr_irq+0x2a0/0x2a0 [ 292.686178] ? rtnl_unlock+0xe/0x10 [ 292.689799] ? unregister_netdevice_many+0x50/0x50 [ 292.694718] ? dev_change_net_namespace+0xa10/0xa10 [ 292.699721] ops_exit_list.isra.0+0xfc/0x150 [ 292.704112] cleanup_net+0x3ba/0x870 [ 292.707810] ? net_drop_ns+0x80/0x80 [ 292.711503] ? __lock_is_held+0xb6/0x140 [ 292.715541] ? check_preemption_disabled+0x3c/0x250 [ 292.720538] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 292.725968] process_one_work+0x863/0x1600 [ 292.730181] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 292.734839] worker_thread+0x5d9/0x1050 [ 292.738803] kthread+0x319/0x430 [ 292.742144] ? process_one_work+0x1600/0x1600 [ 292.746617] ? kthread_create_on_node+0xd0/0xd0 [ 292.751272] ret_from_fork+0x24/0x30 [ 292.754965] [ 292.754966] ====================================================== [ 292.754968] WARNING: possible circular locking dependency detected [ 292.754969] 4.14.163-syzkaller #0 Not tainted [ 292.754971] ------------------------------------------------------ [ 292.754972] kworker/u4:4/2338 is trying to acquire lock: [ 292.754973] ((console_sem).lock){-.-.}, at: [] down_trylock+0x13/0x70 [ 292.754978] [ 292.754979] but task is already holding lock: [ 292.754980] (&obj_hash[i].lock){-.-.}, at: [] debug_check_no_obj_freed+0x12d/0x7b7 [ 292.754984] [ 292.754985] which lock already depends on the new lock. [ 292.754986] [ 292.754987] [ 292.754988] the existing dependency chain (in reverse order) is: [ 292.754989] [ 292.754990] -> #5 (&obj_hash[i].lock){-.-.}: [ 292.754994] lock_acquire+0x16f/0x430 [ 292.754995] _raw_spin_lock_irqsave+0x95/0xcd [ 292.754997] debug_object_activate+0x10b/0x450 [ 292.754998] enqueue_hrtimer+0x27/0x3b0 [ 292.754999] hrtimer_start_range_ns+0x50a/0x10d0 [ 292.755000] schedule_hrtimeout_range_clock+0x17c/0x340 [ 292.755002] schedule_hrtimeout+0x25/0x30 [ 292.755003] wait_task_inactive+0x4ac/0x580 [ 292.755004] __kthread_bind_mask+0x24/0xc0 [ 292.755005] kthread_bind_mask+0x23/0x30 [ 292.755007] create_worker+0x31b/0x530 [ 292.755008] workqueue_init+0x57b/0x68a [ 292.755009] kernel_init_freeable+0x2af/0x532 [ 292.755010] kernel_init+0x12/0x162 [ 292.755011] ret_from_fork+0x24/0x30 [ 292.755012] [ 292.755013] -> #4 (hrtimer_bases.lock){-.-.}: [ 292.755017] lock_acquire+0x16f/0x430 [ 292.755018] _raw_spin_lock_irqsave+0x95/0xcd [ 292.755020] lock_hrtimer_base.isra.0+0x75/0x130 [ 292.755021] hrtimer_start_range_ns+0x7a/0x10d0 [ 292.755022] enqueue_task_rt+0x972/0xe40 [ 292.755024] __sched_setscheduler.constprop.0+0xc59/0x2340 [ 292.755025] _sched_setscheduler+0x10e/0x180 [ 292.755026] sched_setscheduler+0xe/0x10 [ 292.755028] watchdog_enable+0x10b/0x160 [ 292.755029] smpboot_thread_fn+0x444/0x960 [ 292.755030] kthread+0x319/0x430 [ 292.755031] ret_from_fork+0x24/0x30 [ 292.755032] [ 292.755032] -> #3 (&rt_b->rt_runtime_lock){-.-.}: [ 292.755037] lock_acquire+0x16f/0x430 [ 292.755038] _raw_spin_lock+0x2f/0x40 [ 292.755040] enqueue_task_rt+0x524/0xe40 [ 292.755041] __sched_setscheduler.constprop.0+0xc59/0x2340 [ 292.755042] _sched_setscheduler+0x10e/0x180 [ 292.755043] sched_setscheduler+0xe/0x10 [ 292.755045] watchdog_enable+0x10b/0x160 [ 292.755046] smpboot_thread_fn+0x444/0x960 [ 292.755047] kthread+0x319/0x430 [ 292.755048] ret_from_fork+0x24/0x30 [ 292.755049] [ 292.755049] -> #2 (&rq->lock){-.-.}: [ 292.755054] lock_acquire+0x16f/0x430 [ 292.755055] _raw_spin_lock+0x2f/0x40 [ 292.755056] task_fork_fair+0x63/0x5b0 [ 292.755057] sched_fork+0x3a6/0xc10 [ 292.755058] copy_process.part.0+0x15b7/0x6a70 [ 292.755060] _do_fork+0x19e/0xce0 [ 292.755061] kernel_thread+0x34/0x40 [ 292.755062] rest_init+0x24/0x1e2 [ 292.755063] start_kernel+0x6df/0x6fd [ 292.755064] x86_64_start_reservations+0x29/0x2b [ 292.755066] x86_64_start_kernel+0x77/0x7b [ 292.755067] secondary_startup_64+0xa5/0xb0 [ 292.755067] [ 292.755068] -> #1 (&p->pi_lock){-.-.}: [ 292.755073] lock_acquire+0x16f/0x430 [ 292.755074] _raw_spin_lock_irqsave+0x95/0xcd [ 292.755075] try_to_wake_up+0x79/0xf90 [ 292.755076] wake_up_process+0x10/0x20 [ 292.755077] __up.isra.0+0x136/0x1a0 [ 292.755079] up+0x9c/0xe0 [ 292.755080] __up_console_sem+0xad/0x1b0 [ 292.755081] console_unlock+0x59d/0xed0 [ 292.755083] vprintk_emit+0x1f9/0x600 [ 292.755084] vprintk_default+0x28/0x30 [ 292.755085] vprintk_func+0x5d/0x159 [ 292.755086] printk+0x9e/0xbc [ 292.755087] kauditd_hold_skb.cold+0x3e/0x4d [ 292.755088] kauditd_send_queue+0xfe/0x140 [ 292.755090] kauditd_thread+0x644/0x860 [ 292.755091] kthread+0x319/0x430 [ 292.755092] ret_from_fork+0x24/0x30 [ 292.755093] [ 292.755093] -> #0 ((console_sem).lock){-.-.}: [ 292.755098] __lock_acquire+0x2cb3/0x4620 [ 292.755099] lock_acquire+0x16f/0x430 [ 292.755100] _raw_spin_lock_irqsave+0x95/0xcd [ 292.755101] down_trylock+0x13/0x70 [ 292.755103] __down_trylock_console_sem+0x9c/0x200 [ 292.755104] console_trylock+0x17/0x80 [ 292.755105] vprintk_emit+0x1eb/0x600 [ 292.755106] vprintk_default+0x28/0x30 [ 292.755107] vprintk_func+0x5d/0x159 [ 292.755109] printk+0x9e/0xbc [ 292.755110] debug_print_object.cold+0xa7/0xdb [ 292.755111] debug_check_no_obj_freed+0x3f5/0x7b7 [ 292.755113] kfree+0xbd/0x270 [ 292.755114] kvfree+0x4d/0x60 [ 292.755115] netdev_freemem+0x4c/0x60 [ 292.755116] netdev_release+0x72/0x90 [ 292.755117] device_release+0x163/0x1a0 [ 292.755118] kobject_put+0x14e/0x210 [ 292.755120] netdev_run_todo+0x4e4/0x770 [ 292.755121] rtnl_unlock+0xe/0x10 [ 292.755122] default_device_exit_batch+0x328/0x3d0 [ 292.755123] ops_exit_list.isra.0+0xfc/0x150 [ 292.755125] cleanup_net+0x3ba/0x870 [ 292.755126] process_one_work+0x863/0x1600 [ 292.755127] worker_thread+0x5d9/0x1050 [ 292.755128] kthread+0x319/0x430 [ 292.755129] ret_from_fork+0x24/0x30 [ 292.755130] [ 292.755131] other info that might help us debug this: [ 292.755132] [ 292.755133] Chain exists of: [ 292.755134] (console_sem).lock --> hrtimer_bases.lock --> &obj_hash[i].lock [ 292.755139] [ 292.755141] Possible unsafe locking scenario: [ 292.755142] [ 292.755143] CPU0 CPU1 [ 292.755144] ---- ---- [ 292.755145] lock(&obj_hash[i].lock); [ 292.755148] lock(hrtimer_bases.lock); [ 292.755151] lock(&obj_hash[i].lock); [ 292.755153] lock((console_sem).lock); [ 292.755156] [ 292.755157] *** DEADLOCK *** [ 292.755157] [ 292.755159] 4 locks held by kworker/u4:4/2338: [ 292.755159] #0: ("%s""netns"){+.+.}, at: [] process_one_work+0x76e/0x1600 [ 292.755164] #1: (net_cleanup_work){+.+.}, at: [] process_one_work+0x7ab/0x1600 [ 292.755169] #2: (net_mutex){+.+.}, at: [] cleanup_net+0x11c/0x870 [ 292.755173] #3: (&obj_hash[i].lock){-.-.}, at: [] debug_check_no_obj_freed+0x12d/0x7b7 [ 292.755178] [ 292.755179] stack backtrace: [ 292.755181] CPU: 1 PID: 2338 Comm: kworker/u4:4 Not tainted 4.14.163-syzkaller #0 [ 292.755183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.755184] Workqueue: netns cleanup_net [ 292.755186] Call Trace: [ 292.755187] dump_stack+0x142/0x197 [ 292.755188] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 292.755189] __lock_acquire+0x2cb3/0x4620 [ 292.755191] ? add_lock_to_list.isra.0+0x17c/0x330 [ 292.755192] ? trace_hardirqs_on+0x10/0x10 [ 292.755193] ? perf_trace_lock_acquire+0x10d/0x4f0 [ 292.755194] ? save_trace+0x290/0x290 [ 292.755196] ? kvm_clock_read+0x23/0x40 [ 292.755197] ? kvm_sched_clock_read+0x9/0x20 [ 292.755198] lock_acquire+0x16f/0x430 [ 292.755199] ? down_trylock+0x13/0x70 [ 292.755200] _raw_spin_lock_irqsave+0x95/0xcd [ 292.755202] ? down_trylock+0x13/0x70 [ 292.755203] ? vprintk_emit+0x1eb/0x600 [ 292.755204] down_trylock+0x13/0x70 [ 292.755205] ? vprintk_emit+0x1eb/0x600 [ 292.755206] __down_trylock_console_sem+0x9c/0x200 [ 292.755208] console_trylock+0x17/0x80 [ 292.755209] vprintk_emit+0x1eb/0x600 [ 292.755210] vprintk_default+0x28/0x30 [ 292.755211] vprintk_func+0x5d/0x159 [ 292.755212] ? perf_trace_lock+0x500/0x500 [ 292.755213] ? work_on_cpu_safe+0x80/0x80 [ 292.755214] printk+0x9e/0xbc [ 292.755216] ? show_regs_print_info+0x63/0x63 [ 292.755217] ? lock_acquire+0x16f/0x430 [ 292.755218] ? debug_check_no_obj_freed+0x12d/0x7b7 [ 292.755220] ? work_on_cpu_safe+0x80/0x80 [ 292.755221] debug_print_object.cold+0xa7/0xdb [ 292.755222] debug_check_no_obj_freed+0x3f5/0x7b7 [ 292.755224] ? free_obj_work+0x6d0/0x6d0 [ 292.755225] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 292.755226] kfree+0xbd/0x270 [ 292.755227] ? xps_cpus_show+0x600/0x600 [ 292.755229] kvfree+0x4d/0x60 [ 292.755230] netdev_freemem+0x4c/0x60 [ 292.755231] netdev_release+0x72/0x90 [ 292.755232] device_release+0x163/0x1a0 [ 292.755234] ? dev_attr_show+0xc0/0xc0 [ 292.755235] kobject_put+0x14e/0x210 [ 292.755236] ? batadv_get_drvinfo+0x140/0x140 [ 292.755237] netdev_run_todo+0x4e4/0x770 [ 292.755238] ? br_dev_open+0x70/0x70 [ 292.755240] ? netdev_info+0xf0/0xf0 [ 292.755241] ? register_netdev+0x30/0x30 [ 292.755242] ? unregister_netdevice_queue+0x196/0x230 [ 292.755243] rtnl_unlock+0xe/0x10 [ 292.755245] default_device_exit_batch+0x328/0x3d0 [ 292.755246] ? unregister_netdevice_many+0x50/0x50 [ 292.755247] ? rtnl_unlock+0xe/0x10 [ 292.755248] ? do_wait_intr_irq+0x2a0/0x2a0 [ 292.755250] ? rtnl_unlock+0xe/0x10 [ 292.755251] ? unregister_netdevice_many+0x50/0x50 [ 292.755252] ? dev_change_net_namespace+0xa10/0xa10 [ 292.755254] ops_exit_list.isra.0+0xfc/0x150 [ 292.755255] cleanup_net+0x3ba/0x870 [ 292.755256] ? net_drop_ns+0x80/0x80 [ 292.755257] ? __lock_is_held+0xb6/0x140 [ 292.755258] ? check_preemption_disabled+0x3c/0x250 [ 292.755260] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 292.755261] process_one_work+0x863/0x1600 [ 292.755262] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 292.755264] worker_thread+0x5d9/0x1050 [ 292.755265] kthread+0x319/0x430 [ 292.755266] ? process_one_work+0x1600/0x1600 [ 292.755267] ? kthread_create_on_node+0xd0/0xd0 [ 292.755268] ret_from_fork+0x24/0x30 [ 293.873049] Shutting down cpus with NMI [ 294.824452] Kernel Offset: disabled [ 294.828081] Rebooting in 86400 seconds..