x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4800000000000000}) 07:47:49 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:47:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x14000000, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3127.311380] hfs: can't find a HFS filesystem on dev loop1 [ 3127.318493] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3127.402953] hfs: can't find a HFS filesystem on dev loop1 07:47:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x88480000, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:49 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xec00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:49 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x1000000000}) 07:47:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0xf401, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3127.613944] hfs: can't find a HFS filesystem on dev loop1 [ 3127.700953] hfs: can't find a HFS filesystem on dev loop1 07:47:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x6000000}, 0x1c) 07:47:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:50 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5a00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0xe0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:50 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xf9fdffff}) 07:47:50 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff1f00]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) [ 3128.177487] hfs: unable to parse mount options 07:47:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x8848000000000000, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3128.219471] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3128.247441] hfs: unable to parse mount options 07:47:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:50 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x74000000}) 07:47:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x4000, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:50 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7a00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3128.388348] hfs: can't find a HFS filesystem on dev loop1 07:47:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x40000000, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3128.486635] hfs: can't find a HFS filesystem on dev loop1 07:47:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x9213000000000000}, 0x1c) 07:47:51 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x8}) 07:47:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x2000000, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:51 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:51 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) [ 3129.071418] hfs: unable to parse mount options 07:47:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x88470000, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3129.092486] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3129.156974] hfs: unable to parse mount options 07:47:51 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x6c}) 07:47:51 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xee, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x6, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3129.265776] hfs: unable to parse mount options 07:47:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3129.334610] hfs: unable to parse mount options 07:47:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0xffffca88, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xd00000000000000}, 0x1c) 07:47:51 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x7000000}) 07:47:51 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:51 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:47:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8035000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3129.952423] hfs: can't find a HFS filesystem on dev loop1 [ 3129.956588] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:47:52 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb401000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3130.031800] hfs: can't find a HFS filesystem on dev loop1 07:47:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xf000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x2000000}) 07:47:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x1400000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3130.217548] hfs: can't find a HFS filesystem on dev loop1 07:47:52 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x48000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3130.320776] hfs: can't find a HFS filesystem on dev loop1 07:47:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x800000000000000}, 0x1c) 07:47:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x3c00000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x5000000}) 07:47:52 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6e00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:52 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:47:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x88640000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3130.817633] hfs: can't find a HFS filesystem on dev loop1 [ 3130.843484] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3130.887117] hfs: can't find a HFS filesystem on dev loop1 07:47:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8847, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:53 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x3f00}) 07:47:53 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3801, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x1400, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3131.068626] hfs: can't find a HFS filesystem on dev loop1 07:47:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:53 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1b4, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3131.156933] hfs: can't find a HFS filesystem on dev loop1 07:47:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xff00000000000000}, 0x1c) 07:47:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x600000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:53 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x7a}) 07:47:53 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa4010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:53 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:47:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x7000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3131.685931] hfs: unable to parse mount options [ 3131.738323] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3131.758787] hfs: unable to parse mount options 07:47:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x600, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:53 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4c00000000000000}) 07:47:53 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x160, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x81000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3131.933711] hfs: can't find a HFS filesystem on dev loop1 [ 3131.996037] hfs: can't find a HFS filesystem on dev loop1 07:47:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:54 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2d01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x45210000}, 0x1c) 07:47:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x6000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:54 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4244000000000000}) 07:47:54 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xcb010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:54 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:47:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x88a8ffff00000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3132.591154] hfs: can't find a HFS filesystem on dev loop1 [ 3132.631001] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3132.658066] hfs: can't find a HFS filesystem on dev loop1 07:47:54 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x8cffffff}) 07:47:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xffffdd86, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:54 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb4000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3132.790447] hfs: unable to parse mount options [ 3132.833542] hfs: unable to parse mount options 07:47:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x6, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:55 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x48}) [ 3133.033183] hfs: unable to parse mount options [ 3133.098069] hfs: unable to parse mount options 07:47:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x700000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:55 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6b010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:55 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xfcfdffff00000000}) 07:47:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xd000000}, 0x1c) 07:47:55 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:47:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x86ddffff, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3133.462868] hfs: can't find a HFS filesystem on dev loop1 [ 3133.511606] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3133.542974] hfs: can't find a HFS filesystem on dev loop1 07:47:55 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x500000000000000}) 07:47:55 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1d0, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xfffffffffffff000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3133.653462] hfs: can't find a HFS filesystem on dev loop1 [ 3133.716009] hfs: can't find a HFS filesystem on dev loop1 07:47:55 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1fd, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x6000000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:55 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x97ffffff}) 07:47:55 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x200000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3133.959828] hfs: unable to parse mount options [ 3134.026053] hfs: unable to parse mount options 07:47:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x3f000000}, 0x1c) 07:47:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x88a8ffff, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:56 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x20100000}) 07:47:56 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3a000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:56 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:47:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x800e, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:56 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3134.380394] hfs: can't find a HFS filesystem on dev loop1 [ 3134.396539] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3134.472273] hfs: can't find a HFS filesystem on dev loop1 07:47:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:56 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x6c00}) 07:47:56 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2e, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xffffca88, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3134.898138] hfs: can't find a HFS filesystem on dev loop1 [ 3134.972310] hfs: can't find a HFS filesystem on dev loop1 07:47:57 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xa}) 07:47:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x80350000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:57 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1b1, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:57 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:47:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x11000000}, 0x1c) 07:47:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xffffa888, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3135.240222] hfs: unable to parse mount options [ 3135.254422] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:47:57 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x151, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3135.340074] hfs: unable to parse mount options 07:47:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x4000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:57 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x74}) 07:47:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:57 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1000000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x400000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3135.820360] hfs: unable to parse mount options [ 3135.886301] hfs: unable to parse mount options 07:47:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x608, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:58 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x8000000000000000}) 07:47:58 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc6000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3136.037199] hfs: can't find a HFS filesystem on dev loop1 07:47:58 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:47:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xff00}, 0x1c) 07:47:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xb00000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3136.101084] hfs: can't find a HFS filesystem on dev loop1 07:47:58 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xac0d000000000000}) 07:47:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x86ddffff00000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3136.242569] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3136.301779] hfs: can't find a HFS filesystem on dev loop1 07:47:58 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7e010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3136.346997] hfs: can't find a HFS filesystem on dev loop1 07:47:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8100000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:58 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x42440000}) 07:47:58 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xbf00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x89060000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3136.738851] hfs: can't find a HFS filesystem on dev loop1 [ 3136.801412] hfs: can't find a HFS filesystem on dev loop1 07:47:58 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x7}) 07:47:59 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c01000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) [ 3136.974554] hfs: unable to parse mount options [ 3137.016317] hfs: unable to parse mount options 07:47:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xea8}, 0x1c) 07:47:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x2800, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:59 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1701, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:59 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xffffff8c}) 07:47:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x543, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3137.147374] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3137.180087] hfs: unable to parse mount options [ 3137.258698] hfs: unable to parse mount options 07:47:59 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xcd, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8000a0ffffffff, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:47:59 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xfffffff5}) 07:47:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x88caffff, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3137.647270] hfs: unable to parse mount options [ 3137.728888] hfs: unable to parse mount options 07:47:59 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1d, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:47:59 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:47:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x91ffffff00000000}, 0x1c) 07:47:59 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xf9fdffff00000000}) 07:47:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x28, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:47:59 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xca010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x1f4, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3137.995257] hfs: can't find a HFS filesystem on dev loop1 [ 3138.040888] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3138.079955] hfs: can't find a HFS filesystem on dev loop1 07:48:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x88480000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:00 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x2010000000000000}) [ 3138.252296] hfs: can't find a HFS filesystem on dev loop1 [ 3138.309984] hfs: can't find a HFS filesystem on dev loop1 07:48:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:00 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xae01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x88470000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:00 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x7400}) [ 3138.595705] hfs: can't find a HFS filesystem on dev loop1 07:48:00 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) [ 3138.692275] hfs: can't find a HFS filesystem on dev loop1 07:48:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xd00}, 0x1c) 07:48:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x4788, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:00 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6100, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:00 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x6800}) 07:48:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x100000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3138.914673] hfs: can't find a HFS filesystem on dev loop1 [ 3138.929051] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3138.995886] hfs: can't find a HFS filesystem on dev loop1 07:48:01 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1901, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8864000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:01 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x600000000000000}) 07:48:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x43050000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:01 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x103, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3139.505666] hfs: can't find a HFS filesystem on dev loop1 [ 3139.616370] hfs: can't find a HFS filesystem on dev loop1 07:48:01 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x1500}, 0x1c) 07:48:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x3c00, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:01 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x59, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:01 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x1f000000}) 07:48:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x3580, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3139.815452] hfs: can't find a HFS filesystem on dev loop1 [ 3139.834359] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x689, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xb000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3139.938087] hfs: can't find a HFS filesystem on dev loop1 07:48:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:02 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x17d, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:02 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x9000000}) 07:48:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x3000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3140.416479] hfs: can't find a HFS filesystem on dev loop1 [ 3140.490670] hfs: can't find a HFS filesystem on dev loop1 07:48:02 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x80fe}, 0x1c) 07:48:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x4305, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:02 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa301000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:02 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xac0d0000}) [ 3140.711802] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3140.716455] hfs: can't find a HFS filesystem on dev loop1 07:48:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xe000000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3140.797664] hfs: can't find a HFS filesystem on dev loop1 07:48:02 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8e01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:02 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x900}) 07:48:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xfffff000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3141.023797] hfs: can't find a HFS filesystem on dev loop1 [ 3141.085830] hfs: can't find a HFS filesystem on dev loop1 07:48:03 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x1100000000000000}, 0x1c) 07:48:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x4000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:03 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9401, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:03 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x2300}) 07:48:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x3e8, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3141.566755] hfs: can't find a HFS filesystem on dev loop1 [ 3141.628842] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3141.656925] hfs: can't find a HFS filesystem on dev loop1 07:48:03 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe4, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:03 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x6}) 07:48:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x28000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:03 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3141.856495] hfs: unable to parse mount options [ 3141.937254] hfs: unable to parse mount options 07:48:04 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x500000000000000}, 0x1c) 07:48:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xffffffffa0008000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:04 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xcc000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x5453}) [ 3142.454229] hfs: unable to parse mount options 07:48:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8906000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3142.512753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3142.543948] hfs: unable to parse mount options 07:48:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xa00000000000000}) 07:48:04 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xae00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x806000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3142.732989] hfs: can't find a HFS filesystem on dev loop1 [ 3142.797726] hfs: can't find a HFS filesystem on dev loop1 07:48:05 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x18020000}, 0x1c) 07:48:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xf401, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:05 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x400000000000000}) 07:48:05 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x16f, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xd, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3143.358165] hfs: can't find a HFS filesystem on dev loop1 07:48:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3143.413127] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3143.436285] hfs: can't find a HFS filesystem on dev loop1 07:48:05 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1200000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x60, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:05 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xf6ffffff00000000}) 07:48:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3143.676363] hfs: can't find a HFS filesystem on dev loop1 [ 3143.767938] hfs: can't find a HFS filesystem on dev loop1 07:48:05 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x4305000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:06 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x88, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xa0008000}, 0x1c) 07:48:06 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xffffffffffffff7f}) 07:48:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xf4010000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3144.267182] hfs: unable to parse mount options 07:48:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3144.309429] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3144.327427] hfs: unable to parse mount options 07:48:06 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x300}) 07:48:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8848, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:06 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9301000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3144.531885] hfs: can't find a HFS filesystem on dev loop1 [ 3144.602766] hfs: can't find a HFS filesystem on dev loop1 07:48:06 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8847000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:06 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x2000}) 07:48:06 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9200000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3144.804440] hfs: can't find a HFS filesystem on dev loop1 [ 3144.867935] hfs: can't find a HFS filesystem on dev loop1 07:48:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x12000000}, 0x1c) 07:48:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x300000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:07 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xc0ed0000}) 07:48:07 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb2000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xb, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3145.141542] hfs: can't find a HFS filesystem on dev loop1 [ 3145.165953] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:07 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6501, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3145.255918] hfs: can't find a HFS filesystem on dev loop1 07:48:07 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x7a000000}) 07:48:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3145.389006] hfs: can't find a HFS filesystem on dev loop1 [ 3145.471175] hfs: can't find a HFS filesystem on dev loop1 07:48:07 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x3, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:07 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:07 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x9}) [ 3145.703619] hfs: unable to parse mount options [ 3145.766212] hfs: unable to parse mount options 07:48:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xf5010000}, 0x1c) 07:48:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x40000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:07 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9801000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:07 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x6800000000000000}) 07:48:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xd000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3146.002689] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3146.016002] hfs: can't find a HFS filesystem on dev loop1 07:48:08 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xed010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3146.093583] hfs: can't find a HFS filesystem on dev loop1 07:48:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x6000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:08 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:08 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x2300000000000000}) 07:48:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x4, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:08 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xcc01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3146.631920] hfs: can't find a HFS filesystem on dev loop1 [ 3146.709511] hfs: can't find a HFS filesystem on dev loop1 07:48:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xd00000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:08 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1d01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xfc000000}, 0x1c) 07:48:08 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xa00}) 07:48:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xf0ffffffffffff, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3146.858293] hfs: can't find a HFS filesystem on dev loop1 [ 3146.880203] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xf0ffff, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3146.949575] hfs: can't find a HFS filesystem on dev loop1 07:48:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8060000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:09 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x13d, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:09 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:09 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x2}) 07:48:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x14000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:09 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x15c, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x1000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3147.526577] hfs: unable to parse mount options [ 3147.599562] hfs: unable to parse mount options 07:48:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xfc}, 0x1c) 07:48:09 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7c01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x6488, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:09 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xfdffffff00000000}) 07:48:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x2, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3147.828853] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3147.855255] hfs: can't find a HFS filesystem on dev loop1 07:48:09 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa201, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3147.940704] hfs: can't find a HFS filesystem on dev loop1 07:48:10 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x800000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:10 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x10}) 07:48:10 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1001, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xe803, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3148.429501] hfs: unable to parse mount options [ 3148.506679] hfs: unable to parse mount options 07:48:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x2ac8a51f00000000}, 0x1c) 07:48:10 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x102, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8906, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:10 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x2010}) 07:48:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8100, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3148.696058] hfs: unable to parse mount options [ 3148.728936] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:10 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1cf, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3148.775209] hfs: unable to parse mount options 07:48:11 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x14, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:11 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xfffffdfc}) 07:48:11 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xab01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xe803000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3149.291437] hfs: unable to parse mount options [ 3149.358888] hfs: unable to parse mount options 07:48:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x102}, 0x1c) 07:48:11 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4}) 07:48:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xe80, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:11 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9c01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3149.587219] hfs: unable to parse mount options 07:48:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xe000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3149.632094] hfs: unable to parse mount options [ 3149.647861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:11 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf500, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:12 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xf0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:12 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xfffffffb}) 07:48:12 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5d, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3150.137237] hfs: unable to parse mount options [ 3150.228314] hfs: unable to parse mount options 07:48:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xe0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0xc0fe}, 0x1c) 07:48:12 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x2000000000000000}) 07:48:12 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x193, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x3c000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x300, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3150.484439] hfs: can't find a HFS filesystem on dev loop1 07:48:12 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x16c, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3150.536686] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3150.565007] hfs: can't find a HFS filesystem on dev loop1 07:48:13 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff1f0000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:13 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xa0008000}) 07:48:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xf401000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:13 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x132, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3151.066895] hfs: can't find a HFS filesystem on dev loop1 [ 3151.135414] hfs: can't find a HFS filesystem on dev loop1 07:48:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x800e0000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x7b9f95e64f}, 0x1c) 07:48:13 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xfc00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:13 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xa000000}) 07:48:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x2800000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3151.360814] hfs: can't find a HFS filesystem on dev loop1 07:48:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x88caffff00000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3151.402579] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3151.428600] hfs: can't find a HFS filesystem on dev loop1 07:48:13 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2300, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xb00, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:13 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xfffffdfd}) 07:48:13 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:13 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6601000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3151.918999] hfs: unable to parse mount options [ 3151.985431] hfs: unable to parse mount options 07:48:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x3c, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x55}, 0x1c) 07:48:14 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xffffff7f00000000}) 07:48:14 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x78000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xd00, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xe0000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3152.267845] hfs: can't find a HFS filesystem on dev loop1 [ 3152.283888] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:14 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x116, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:14 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x20000}) [ 3152.344060] hfs: can't find a HFS filesystem on dev loop1 07:48:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x4888, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3152.439033] hfs: can't find a HFS filesystem on dev loop1 [ 3152.518390] hfs: can't find a HFS filesystem on dev loop1 07:48:14 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x60000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9e, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:15 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x500}) [ 3153.013568] hfs: can't find a HFS filesystem on dev loop1 07:48:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x3e8}, 0x1c) 07:48:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x806, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9b00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3153.078830] hfs: can't find a HFS filesystem on dev loop1 07:48:15 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xac0d}) 07:48:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xe8030000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3153.236438] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8864, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3153.295509] hfs: unable to parse mount options 07:48:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x14010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3153.364279] hfs: unable to parse mount options 07:48:15 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:15 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x600}) 07:48:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x800e000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5101, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3153.668937] hfs: can't find a HFS filesystem on dev loop1 [ 3153.748378] hfs: can't find a HFS filesystem on dev loop1 07:48:16 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xdac}) 07:48:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x700, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:16 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5c, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x2a00}, 0x1c) 07:48:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8848000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3154.060203] hfs: unable to parse mount options [ 3154.118148] hfs: unable to parse mount options [ 3154.125797] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:16 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4000000000000000}) 07:48:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0xa0008000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3154.309222] hfs: can't find a HFS filesystem on dev loop1 [ 3154.395736] hfs: can't find a HFS filesystem on dev loop1 07:48:16 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:16 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc700000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8000a0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:16 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4244}) [ 3154.557292] hfs: unable to parse mount options 07:48:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x2000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3154.611189] hfs: unable to parse mount options 07:48:16 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x23}) 07:48:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x8035, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3154.794301] hfs: unable to parse mount options [ 3154.837822] hfs: unable to parse mount options 07:48:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x2000009c) 07:48:16 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x201000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x7, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:16 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x6000000}) 07:48:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3155.037802] hfs: can't find a HFS filesystem on dev loop1 [ 3155.097281] hfs: can't find a HFS filesystem on dev loop1 07:48:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x17) 07:48:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x4000000000000000, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:17 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc1010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:17 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:17 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x3000000}) 07:48:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x40100) setsockopt$inet6_tcp_int(r1, 0x6, 0x6, &(0x7f00000000c0)=0x202, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) lseek(r0, 0x0, 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x1000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3155.507398] hfs: can't find a HFS filesystem on dev loop1 [ 3155.590938] hfs: can't find a HFS filesystem on dev loop1 07:48:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040)={0x10001}, 0x1) 07:48:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x6000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:17 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4800}) 07:48:17 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1b3, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x1400, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3155.813757] hfs: can't find a HFS filesystem on dev loop1 [ 3155.821190] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x88caffff, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3155.921601] hfs: can't find a HFS filesystem on dev loop1 07:48:18 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x1020}) [ 3156.182991] hfs: unable to parse mount options [ 3156.254276] hfs: unable to parse mount options 07:48:18 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:18 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3a, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x6000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:18 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x300000000000000}) [ 3156.478304] hfs: can't find a HFS filesystem on dev loop1 [ 3156.555176] hfs: can't find a HFS filesystem on dev loop1 07:48:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x200803, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x9, 0x4, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) r5 = fcntl$getown(r4, 0x9) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, r5}) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8060000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:18 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xff0f000000000000}) 07:48:18 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf701000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3156.772597] hfs: can't find a HFS filesystem on dev loop1 07:48:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x80350000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3156.831468] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3156.864235] hfs: can't find a HFS filesystem on dev loop1 07:48:19 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xf6ffffff}) 07:48:19 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x32000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3157.236008] hfs: unable to parse mount options 07:48:19 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x100000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3157.334682] hfs: unable to parse mount options 07:48:19 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x700}) 07:48:19 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc9000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3157.576428] hfs: can't find a HFS filesystem on dev loop1 07:48:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000009, &(0x7f0000000100)=0x201, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty, 0x2}, 0x1c) listen(r2, 0x0) ioctl$sock_ifreq(r0, 0x8917, &(0x7f00000000c0)={'bpq0\x00', @ifru_map={0x7fc00000000000, 0x3, 0x5, 0xbf7, 0x7}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x4, 0x3, 0x2, 0x2, {0xa, 0x4e22, 0x4, @remote, 0x1000}}}, 0x32) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xd000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3157.644580] hfs: can't find a HFS filesystem on dev loop1 07:48:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x2800, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:19 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x5354}) [ 3157.872799] hfs: unable to parse mount options [ 3157.924876] hfs: unable to parse mount options 07:48:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:20 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2b00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xe80, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3158.061012] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:20 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:20 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xfdfdffff00000000}) 07:48:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x300000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:20 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x4, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3158.385132] hfs: can't find a HFS filesystem on dev loop1 07:48:20 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd6000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xf401000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3158.463034] hfs: can't find a HFS filesystem on dev loop1 07:48:20 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xf4ffffff}) [ 3158.681813] hfs: unable to parse mount options [ 3158.736289] hfs: unable to parse mount options 07:48:20 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x88000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x28000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:20 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xe0000}) 07:48:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) [ 3158.910794] hfs: can't find a HFS filesystem on dev loop1 [ 3158.983504] hfs: can't find a HFS filesystem on dev loop1 07:48:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_tcp_int(r1, 0x6, 0x27, &(0x7f0000000040), &(0x7f0000000100)=0x4) listen(r2, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140), 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xf0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:21 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2a, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:21 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcff]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:21 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x3}) 07:48:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x60, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3159.240623] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3159.263930] hfs: unable to parse mount options [ 3159.314160] hfs: unable to parse mount options 07:48:21 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4c}) 07:48:21 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x14b, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x4788, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3159.472668] hfs: unable to parse mount options 07:48:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x700000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3159.546561] hfs: unable to parse mount options 07:48:21 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe000000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:22 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x9, 0x18, 0x3, {0xb, @raw_data="e79c04f4f37b32317a1957fb70c23e471c7e8df1c5a4133ee48940a6d74d39ac6732f382c15013fae7ea71c3aab4379d9ed99c5d365faab66c3c1a0ae2fbd6d5b7170ea832998147a93953a4ba3abf0857fda013daa5d8d78490aef830137e2273abf0d320ad1d3ff8c58c11b4d22c22146c09755af4e1bc7bec427d995fd4862b6bc1ffd0dfd68e0f6ab64a65dde094356132db6bd60fab5fd15891e4619b8faea87a44e7bf84fecbdb2e6f94839901dbc955c4451590536521c97d2beaed82290e56d5e282a56f"}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:22 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x60}) 07:48:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x4305000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:22 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:22 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd100, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3160.119847] hfs: unable to parse mount options 07:48:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xd00000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3160.168588] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3160.180547] hfs: unable to parse mount options 07:48:22 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x7a00000000000000}) 07:48:22 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xfb, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x4000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3160.325018] hfs: can't find a HFS filesystem on dev loop1 [ 3160.389649] hfs: can't find a HFS filesystem on dev loop1 07:48:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x3000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:22 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf6000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:22 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x6000000000000000}) [ 3160.679225] hfs: can't find a HFS filesystem on dev loop1 [ 3160.752350] hfs: can't find a HFS filesystem on dev loop1 07:48:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) 07:48:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:22 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xcd00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3161.011407] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:23 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xb, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:23 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x20000000}) 07:48:23 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5500, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x1}, 0x1c) 07:48:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xffffa888, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3161.140948] hfs: can't find a HFS filesystem on dev loop1 [ 3161.167847] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x543, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3161.243937] hfs: can't find a HFS filesystem on dev loop1 07:48:23 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x14c, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:23 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4000}) [ 3161.353222] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3161.460807] hfs: can't find a HFS filesystem on dev loop1 [ 3161.518863] hfs: can't find a HFS filesystem on dev loop1 07:48:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xd, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:23 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x49, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:23 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0x0, 0x4}, 0x10) 07:48:23 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xffffffffffffffff}) 07:48:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xf0ffffffffffff, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:23 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9a00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x600000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3162.037762] hfs: unable to parse mount options 07:48:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xfffff000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3162.106183] hfs: unable to parse mount options 07:48:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(r0, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x3, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r5 = getegid() setfsgid(r5) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x9, 0x1853, 0x4}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000004c0)={r6, 0x1, 0x20}, &(0x7f0000000500)=0xc) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x88}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3ec849200a43b16dfcf002e823054e7d499ca75320ce342ed54bdbbec16b45bb856201bc695ade74562f412166222697791d11404f5ec978633b03127492846fcef321853a72c424b0896ea5cabbda26ae72b592da806148ae566c803df8d9c4edd78bbd39a00dda040aa26ee78327349477aed8dcca7b50e996f77b9e998bdaad5a5dd44d32e829b2a0909ee0456415117bc4169ea7bf27d4", @ANYRES16=r4, @ANYBLOB="100015000000fcdbdf2501000000080001004e21000008000400010000000800040002000000080001004e240000080001004e230000080001004e200000080003003100000004000500"], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x4) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f00000003c0)=""/231) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfffffffffffffffd, @loopback}, 0x1c) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000040)=0x89e) 07:48:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0x0, 0x4}, 0x10) 07:48:24 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xffffffffa0008000}) 07:48:24 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8401000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3162.263911] hfs: can't find a HFS filesystem on dev loop1 07:48:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x3c00, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3162.358286] hfs: can't find a HFS filesystem on dev loop1 07:48:24 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40000, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000100)={0x17, 0x3, 0x3a6e}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:24 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb0010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x6, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:24 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xf4ffffff00000000}) 07:48:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0x0, 0x4}, 0x10) 07:48:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x3e8, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3162.895035] hfs: can't find a HFS filesystem on dev loop1 [ 3162.918835] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:25 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xdb00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8100000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3163.009378] hfs: can't find a HFS filesystem on dev loop1 07:48:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:48:25 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x68000000}) 07:48:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xffffca88, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3163.246541] hfs: can't find a HFS filesystem on dev loop1 [ 3163.330350] hfs: can't find a HFS filesystem on dev loop1 07:48:25 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:25 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x901, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x800000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x5}]]}}}]}, 0x3c}}, 0x0) 07:48:25 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4c000000}) 07:48:25 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x400001, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) r2 = getgid() r3 = geteuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x800410, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c67326f75705fee3d0460d38236e45e2f8eb27de8730d83f4d2", @ANYRESDEC=r2, @ANYBLOB=',blksize=0x0000000000000000,default_permissions,max_read=0x0000000000000000,default_permissions,max_read=0x0000000000000003,allow_other,blksize=0x0000000000001200,max_read=0x000000000000003f,blksize=0x0000000000000200,smackfsroot=yeah\x00,fscontext=user_u,fsmagic=0x0000000000000101,measure,appraise,fowner>', @ANYRESDEC=r3, @ANYBLOB=',obj_user=]keyring,fowner>', @ANYRESDEC=r4, @ANYBLOB=',fsmagic=0x0000000000000005,\x00']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) pause() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, r6, 0x0, 0xe, &(0x7f0000000440)='/dev/snapshot\x00', 0xffffffffffffffff}, 0x30) ptrace$cont(0x1f, r8, 0x4, 0x8001) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r9, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x2800000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3163.773972] netlink: 'syz-executor4': attribute type 15 has an invalid length. [ 3163.790284] hfs: can't find a HFS filesystem on dev loop1 07:48:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x5}]]}}}]}, 0x3c}}, 0x0) [ 3163.868220] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3163.897728] hfs: can't find a HFS filesystem on dev loop1 07:48:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x5}]]}}}]}, 0x3c}}, 0x0) 07:48:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x300, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3163.939538] netlink: 'syz-executor4': attribute type 15 has an invalid length. 07:48:26 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x3f000000}) 07:48:26 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5b00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3164.052255] netlink: 'syz-executor4': attribute type 15 has an invalid length. [ 3164.109752] hfs: can't find a HFS filesystem on dev loop1 [ 3164.169960] hfs: can't find a HFS filesystem on dev loop1 07:48:26 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x5}]]}}}]}, 0x3c}}, 0x0) 07:48:26 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8d00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:26 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xff0f}) [ 3164.613439] hfs: unable to parse mount options [ 3164.636456] netlink: 'syz-executor4': attribute type 15 has an invalid length. 07:48:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x806000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) recvfrom$inet6(r2, &(0x7f0000000580)=""/4096, 0x1000, 0x2, 0x0, 0x0) [ 3164.702505] hfs: unable to parse mount options 07:48:26 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x5}]]}}}]}, 0x3c}}, 0x0) 07:48:26 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xffffff97}) [ 3164.775110] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:26 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8e010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x3580, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:26 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x5}]]}}}]}, 0x3c}}, 0x0) [ 3164.933463] hfs: unable to parse mount options [ 3164.984094] hfs: unable to parse mount options 07:48:27 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c01]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xffffffffa0008000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x5}]]}}}]}, 0x3c}}, 0x0) 07:48:27 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xe00}) 07:48:27 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x159, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x5}]]}}}]}, 0x3c}}, 0x0) [ 3165.526370] hfs: can't find a HFS filesystem on dev loop1 [ 3165.628021] hfs: can't find a HFS filesystem on dev loop1 07:48:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'gretap0\x00', {0x2, 0x4e22, @multicast1}}) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xf0ffff, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x5}]]}}}]}, 0x3c}}, 0x0) 07:48:27 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x12, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:27 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xe000000000000}) 07:48:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0xc0d}, 0x20}}, 0x0) [ 3165.823608] hfs: can't find a HFS filesystem on dev loop1 [ 3165.839155] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3165.955814] hfs: can't find a HFS filesystem on dev loop1 07:48:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0xc0d}, 0x20}}, 0x0) 07:48:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x88480000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:28 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe301000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:28 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:28 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xf5ffffff}) 07:48:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0xc0d}, 0x20}}, 0x0) [ 3166.433684] hfs: unable to parse mount options [ 3166.516386] hfs: unable to parse mount options 07:48:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@add_del={0x2, &(0x7f0000000040)='veth1_to_bond\x00', 0x2}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) 07:48:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x88a8ffff, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:28 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x53540000}) 07:48:28 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd200000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x88640000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3166.714960] hfs: can't find a HFS filesystem on dev loop1 07:48:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 3166.772368] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3166.803211] hfs: can't find a HFS filesystem on dev loop1 07:48:28 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x82000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:28 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xe}) [ 3166.979409] hfs: unable to parse mount options [ 3167.029074] hfs: unable to parse mount options 07:48:29 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xfffffffffffff000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) 07:48:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f00000000c0), 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = msgget(0x3, 0x1) msgctl$IPC_RMID(r3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:29 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x83010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:29 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x5}) 07:48:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4, 0x2, [@tunl_policy]}}}]}, 0x34}}, 0x0) 07:48:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x608, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3167.657181] hfs: unable to parse mount options 07:48:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4, 0x2, [@tunl_policy]}}}]}, 0x34}}, 0x0) [ 3167.690502] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x3c, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3167.731240] hfs: unable to parse mount options 07:48:29 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1c2, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:29 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x1000000000000}) [ 3167.910753] hfs: can't find a HFS filesystem on dev loop1 [ 3167.964646] hfs: can't find a HFS filesystem on dev loop1 07:48:30 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4, 0x2, [@tunl_policy]}}}]}, 0x34}}, 0x0) 07:48:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x4000000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:30 executing program 3: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x80000) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000003c0)=""/143, &(0x7f0000000340)=0x8f) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:dhcpd_initrc_exec_t:s0\x00', 0x29, 0x2) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'veth0_to_bridge\x00', {0x2, 0x4e24, @loopback}}) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/103, 0x67) 07:48:30 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1c3, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:30 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x4d50000000000000}) 07:48:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x86ddffff, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 3168.513655] netlink: 'syz-executor4': attribute type 15 has an invalid length. [ 3168.536141] hfs: can't find a HFS filesystem on dev loop1 07:48:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 07:48:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x14000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3168.572633] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:30 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:30 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x8000a0ffffffff}) [ 3168.647168] hfs: can't find a HFS filesystem on dev loop1 [ 3168.674265] netlink: 'syz-executor4': attribute type 15 has an invalid length. [ 3168.841787] hfs: unable to parse mount options [ 3168.907617] hfs: unable to parse mount options 07:48:31 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0xc0d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 07:48:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x4000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3169.017048] netlink: 'syz-executor4': attribute type 15 has an invalid length. 07:48:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000140)='yeah\x00', 0x5, 0x1) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x200, 0x4) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r2, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x100, 0x3, &(0x7f0000000580)=[{&(0x7f0000000240)="db87218d0c2373210c8808cb077ea54eb16d83f5da6da496b2c1cf285fae879225d0b0daea1d0727957130fb522c3c9658c69ba981fd4fdee8bca21a287892d76616607225d8450370d61a1f996a46c779253aee0324c2441704f37af37c3fe6d8bfdb4e58473ee17ba27ca08b35bfb1ad600f2f63bd65a2ffff14ca6d71486712e3372552692a3fdad8be79bc56fa8d7ce8ec38c128628647ae1f27225c2157f5c289c9d1991e57461181d3be1a04d13356915d270287c7b1b36e5038e607dbce318efde6f8e9", 0xc7}, {&(0x7f0000000340)="939b1960c873b02e17c26048a2915fdce37ffe7114a382191ae98b539cf4b7ccadc34e1ebbbe26601e14a5a0164a8ee6a647f8e33b96fd9988c4d2cad849", 0x3e, 0x100000001}, {&(0x7f00000004c0)="d60924f0f359445fd6a65fd02a86ac6ceda17c56962cb18f69e0c6e061b9297bf80dcbc88fa83af03fdfe43890aa0c0d87cb613129115ffd8e5f1ff3667416d2a01205", 0x43, 0x5ad9}], 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c6578706f73655f70726976726f6f742c61636c2c6e6f6c61726765696f2c7065726d69745f646972656374696f2c7375626a5f726f6c653d5c2c646566636f6e746578743d726f6f742c726f6f74636f6e746578743d757365725f752c7375626a5f747970653d79656168002c736d61636b6673666c6f6f723d2d272f40212c7569643db14d52b4249461df84ca646902443cd3e3405a62ad15740f228ada689530c017ed097d606bf587de3aad74635ef81f5925cb0909f8054ff98cdae8bafa4484c0f4a7458343a011e6823a8dd6c2e49c7ac2737a2ee21662992533162ca86b35", @ANYRESDEC=r4, @ANYBLOB="2c7065726d69745f646972655b7469902c00"]) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f00000003c0)="4755a2e649bc5b38861fc4e8fa90d77345330f0100b22b0c639cff5fb4f0d1f8ca20137b9df68af3dc713a3f655ee7802c1ef61d0dc1df5da0163dfa6e3d8bbb05c4dabb599518b42292c289b7d2eef24da6d6940c3600bd8949a6d30dd2aeab4195e019fc22c66c5f58bc19b0fab20c56cc087229d4af2e7b2607de52ea6f63818352f01d98f84558c7774d2cc0cd994376a5cc97f5548236dfa34e951e068cb712315926c8857ab1c86e95edbf7756b5d47b7b96f24c18c91061604c535fd0f623a8470405101f9f7d601144f4fd260c08f1", 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0xfff0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x9, 0x1, 0x4, &(0x7f0000ffc000/0x4000)=nil, 0xd4c7}) 07:48:31 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xffffff7f}) 07:48:31 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa1000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x4888, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000200), 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xffffff1d, 0x20000006, &(0x7f0000b63fe4)={0xa, 0x8000000002, 0x0, @empty={[0x3100]}}, 0x1c) 07:48:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xa0008000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3169.426381] hfs: unable to parse mount options [ 3169.431978] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 07:48:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 3169.512635] hfs: unable to parse mount options 07:48:31 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xedc0}) 07:48:31 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x87, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3169.686901] hfs: unable to parse mount options [ 3169.725926] hfs: unable to parse mount options 07:48:31 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xb000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:31 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa400000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:31 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xff0f0000}) 07:48:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x4305, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x4d, "44c180c905d534fde7bb96e0663ad97233ec2030563ba715f3813a46c21e8e6512c05217a16309ed544965edd25ca3d7275f32daf9e643a6b3aaab828b404c11d6a998ae1958a660d27f040935"}, &(0x7f0000000040)=0x55) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r4, 0xe, 0x8000}, &(0x7f00000001c0)=0xc) [ 3169.938332] hfs: can't find a HFS filesystem on dev loop1 07:48:32 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6a010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3170.023006] hfs: can't find a HFS filesystem on dev loop1 07:48:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xffffdd86, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3170.087816] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:32 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xfffffffd}) 07:48:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8847000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3170.453607] hfs: unable to parse mount options [ 3170.528242] hfs: unable to parse mount options 07:48:32 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4100000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xb00, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:32 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:32 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x7fffffffffffffff}) 07:48:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x88a8ffff00000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3170.795380] hfs: unable to parse mount options 07:48:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syncfs(r1) r2 = dup3(0xffffffffffffffff, r0, 0x4000000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$setname(0xf, &(0x7f0000000140)="ac707070312673797374656d2100") r4 = open(&(0x7f0000000040)='./file0\x00', 0x100, 0x88) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000100)=0x8) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) ioctl$SG_SET_TIMEOUT(r4, 0x2201, &(0x7f0000000180)=0x9714) sendto$inet6(r5, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3170.871885] hfs: unable to parse mount options 07:48:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:33 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xf5ffffff00000000}) 07:48:33 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd200, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3170.980972] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3171.068334] hfs: can't find a HFS filesystem on dev loop1 [ 3171.124148] hfs: can't find a HFS filesystem on dev loop1 07:48:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xe803000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:33 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xce01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:33 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x1000000}) 07:48:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x2000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3171.355796] hfs: can't find a HFS filesystem on dev loop1 [ 3171.443999] hfs: can't find a HFS filesystem on dev loop1 07:48:33 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xf000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:33 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7a, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0x40}, 0xffffffffffffffdc) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:33 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0xfdfdffff}) 07:48:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8906, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:33 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1fb, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3171.867617] hfs: unable to parse mount options [ 3171.912846] hfs: unable to parse mount options 07:48:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x2, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) rt_sigprocmask(0x1, &(0x7f0000000040)={0x3}, 0x0, 0x8) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:34 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x8000a0}) 07:48:34 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x12b, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3172.236119] hfs: unable to parse mount options [ 3172.296743] hfs: unable to parse mount options 07:48:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='children\x00') setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000100)={0x80000000, {{0xa, 0x4e23, 0x3, @ipv4, 0x1}}, {{0xa, 0x4e22, 0x8001, @empty, 0x80}}}, 0x108) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x200000, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="01000000000000000a004e216109000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000060000000a004e24ffff0000ff010000000000000000000000000001040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000067a7000000000000000000000000000000000000000000000a004e2006000000ff02000000000000000000000000000100080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e240600000000000000000000000000ffffac1414bb07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000372e50000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2201000000fe8000000000000000000000000000aaff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e228f0e0000fe80000000000000000000000000000acefcffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x390) 07:48:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x400000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:34 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcff000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:34 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xce00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:34 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x8000000}) 07:48:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xf4010000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3172.573414] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3172.580111] hfs: can't find a HFS filesystem on dev loop1 07:48:34 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc300, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3172.673074] hfs: can't find a HFS filesystem on dev loop1 07:48:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 07:48:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xe803, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:35 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}], [], 0x23000000}) 07:48:35 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1c1, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xd00, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3173.180916] hfs: can't find a HFS filesystem on dev loop1 [ 3173.257773] hfs: can't find a HFS filesystem on dev loop1 07:48:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, r2, 0x80000) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x7, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:35 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:35 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe201000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:35 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x200, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000140)=0x1, &(0x7f0000000180)=0x4) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x8c, r1, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x37a75df}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x100000000}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10a}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8014}, 0x4000001) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10, 0x80800) fchdir(r2) 07:48:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8864000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3173.503378] hfs: can't find a HFS filesystem on dev loop1 [ 3173.504133] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8000a0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3173.588822] hfs: can't find a HFS filesystem on dev loop1 07:48:36 executing program 1: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000100)={r0}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:48:36 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1b000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 07:48:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x600, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8906000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3174.095846] hfs: can't find a HFS filesystem on dev loop1 [ 3174.160333] hfs: can't find a HFS filesystem on dev loop1 07:48:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000040)={0x2, r1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:36 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd5000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:36 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:36 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0xaaaacf6, &(0x7f0000000180), 0x0, &(0x7f00000003c0)=ANY=[]) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2) 07:48:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x86ddffff00000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3174.399752] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x40000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:36 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xca01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x800e000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3174.579871] hfs: can't find a HFS filesystem on dev loop1 07:48:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8000a0ffffffff, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 07:48:37 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc001000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:37 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x60201000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4084}, 0x8000) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) timerfd_create(0x0, 0x80000) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f00000000c0)=0x9) [ 3175.045710] hfs: can't find a HFS filesystem on dev loop1 07:48:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x40, 0x920, 0xfffffffffffffe09}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r3, 0x2, 0x30}, &(0x7f0000000200)=0xc) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f0000000240)=r1) sendto$inet6(r6, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x89060000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:37 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:37 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xdc01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:37 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) lgetxattr(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)=@random={'os2.', '{[+\x00'}, &(0x7f0000001180)=""/79, 0x4f) lookup_dcookie(0x9, &(0x7f0000000100)=""/4096, 0x1000) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'teql0\x00', 0x400}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="747970653d65dd24f92c00fc5100f51560f70aa883f85002e331b4b98bdd5a86de161ff81de2db40b5131702d48aaa176caaeb5c4e9c4e5807f1b69518b5773f"]) 07:48:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x60000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3175.272534] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x81000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3175.360046] hfs: can't find a HFS filesystem on dev loop1 07:48:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8100, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3175.439130] hfs: can't find a HFS filesystem on dev loop1 07:48:37 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4201000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:37 executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000100)={{0x3, @name="906c4d40dac5b3ec9c765d76c2c46c2403004c4bff5b2cd9ef94ce7a5e860a92"}, 0x8, 0x0, 0x5}) socket$rds(0x15, 0x5, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x15, &(0x7f0000000980)="b1ef195692942c84771cb41a3dd2774f442e08a189c49ecd99b229faeeba4f747bd207f5e6467b292f63e92c12c5a1ac97551a689ff431881ba5b95c10dbd1dea81fcd38b084aaba334628c9c0078bcb10c6e8e6d553097dc3516bb98fe10035bd13a76d68b44e83ef2ec2d8bd1027ea6b85a2ac1070e1e111de0f61e64b08330d8c74689250e07ba1b80d36a7956ee53e3c49f7fd1fb1e1b62902e9af275a390ed896c46fecb9db1fd38c013eb6e850b65f7ae242c1608effe7ff307b909ef6b8ef8ae1f86c8bf058fa9e4f1e97cd5eceef3edd6d49909dde15ac843564a03cea9b1739654eb31eea66b60e10c89fa7569ed7b861a176ca7f0800aa9373b112a4cc6ee4a477281ed3659509ee34c1ecae7c8a6371ecdf24ef29d2e7b4ce981f6592f23576c54cd97ab3054c1fc8f0fada6129e34c9d690f151e00000000", 0x148) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000140)=""/197) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x6) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x6, 0x4) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) inotify_add_watch(r1, &(0x7f0000000080)='./file1\x00', 0x5000202) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x4000, 0x1}) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x5, 0x8000, 0x8, 0x1, 0x3, 0x3f, 0x1, 0x28b, 0x40, 0x2d4, 0xb50d, 0x1000, 0x38, 0x2, 0xd000000000000000, 0x4, 0x1}, [{0x6, 0x4, 0x4, 0xffffffffffffffe4, 0xffffffffffffff81, 0x40000, 0x3, 0xffffffff}], "c25c851bef42927dcd4b2fa4eddc764d7b1ab470079b0be67ee6176c50202de3bb83dc62847776ebf2855a98e3c26000ea5b8f331e9715bde5c95adeb65ec3fa6b8b37d350c65d41ae7768368b630f934e71d51f322ec2e4b027dafc5f5f23fbde66cfc808dc862fda0b022c9a1da403d706e5a620247831fce0ae235e7f509cc379c64e3fea6c8e441d4f5d84a61262248e96156a14acd4440c0bb34368ca0397537cbbaa43695573ee13f4139e05ef78d2c99d457bc4fba058ac055f50be8f0ab6d65a2d", [[], [], [], [], []]}, 0x63d) 07:48:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x6000000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:38 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x15000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:38 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:38 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xa2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f00000000c0)={0x10, 0x0, 0x3}, 0x10) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000240)=0xe8) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0x2}, [{0x2, 0x4, r1}], {0x4, 0x2}, [], {0x10, 0x6}, {0x20, 0x4}}, 0x2c, 0x1) 07:48:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x1400000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:38 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xca00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3176.171110] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xe000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3176.301983] hfs: can't find a HFS filesystem on dev loop1 07:48:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xb00000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3176.367248] hfs: can't find a HFS filesystem on dev loop1 07:48:38 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5400, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:38 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1dbac13b26cedb5776ab45b78991e08c7a2495488f4e20eed462b44ac6bde6c2ac4ceab6bb0c0e2be737435065705b7cd312c5fba723cacb6169e99a56f58bf52f7883831f43f24069edbb8b9ecb4d6343ca3789cdfeab77d9a77c4247de659de3a613eaeacb77237a17b38f46db71737684f8e92c37d6e58cb117f7750017265d10d4d22d0f1a2748ae59097c01043f108fa73488"]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80800, 0x0) recvfrom$inet(r0, &(0x7f00000000c0)=""/49, 0x31, 0x40010100, &(0x7f0000000100)={0x2, 0x4e24, @broadcast}, 0x10) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 07:48:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xe000000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3176.822783] hfs: unable to parse mount options [ 3176.875837] hfs: unable to parse mount options 07:48:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:39 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5b, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3177.085257] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:39 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x200000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:39 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x6, {{0xa, 0x4e22, 0x4, @mcast2, 0x2}}, 0x1, 0x5, [{{0xa, 0x4e23, 0x1ff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf}}}}, {{0xa, 0x4e21, 0x80000000, @dev={0xfe, 0x80, [], 0x13}, 0x8b5}}, {{0xa, 0x4e20, 0x3f, @dev={0xfe, 0x80, [], 0x10}, 0x80}}, {{0xa, 0x4e20, 0x974, @empty, 0x2}}, {{0xa, 0x4e24, 0x9, @empty, 0x4e}}]}, 0x310) setitimer(0x2, &(0x7f0000000700)={{}, {0x77359400}}, &(0x7f0000000740)) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000680)=""/79) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) getgroups(0x3, &(0x7f00000001c0)=[0xee00, 0x0, 0xee00]) r3 = geteuid() syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x20, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="dbfda080fa759bb1a7e6a72bc8f6cac1c3621b3412bd30677598a11b133af7a1d1573f1f9c57b6b2c7ece5f65abbc5e789ae61213df27d42ba209cda7069ac241ef0f1cb90d3d0f1b224dd0b", 0x4c, 0x8}], 0x40800, &(0x7f0000000200)={[{@quiet='quiet'}, {@type={'type', 0x3d, "54ffbc4b"}}, {@session={'session', 0x3d, 0x1}}, {@part={'part', 0x3d, 0x9}}, {@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@quiet='quiet'}, {@file_umask={'file_umask', 0x3d, 0x80000000}}, {@codepage={'codepage', 0x3d, 'cp1250'}}, {@quiet='quiet'}, {@gid={'gid', 0x3d, r2}}], [{@fowner_eq={'fowner', 0x3d, r3}}]}) 07:48:39 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8301000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xe0000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8847, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3177.231620] hfs: can't find a HFS filesystem on dev loop1 07:48:39 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xef00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3177.332445] hfs: can't find a HFS filesystem on dev loop1 07:48:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x689, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:39 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]) [ 3177.726035] hfs: unable to parse mount options [ 3177.791400] hfs: unable to parse mount options 07:48:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x66) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:39 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x55010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3177.934709] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:40 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8848000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:40 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="541a2c00"]) r0 = creat(&(0x7f0000001540)='./file0\x00', 0x80) openat(r0, &(0x7f0000001580)='./file0\x00', 0x12000, 0x80) r1 = getgid() getresuid(&(0x7f00000002c0)=0x0, &(0x7f00000013c0), &(0x7f0000001400)) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5dbe, 0x4, &(0x7f0000001340)=[{&(0x7f0000000100)="da7a9c2a9be26940079332b9193fb191c7b381bfd4f089e3381de43536e6a8a37a73e2cb89b6b741d0b0f5831152971ebc1c43da4242ea1648c740405b06d331f662f5013cd8cd90343fa65166751ad81aaa87d74d6fc89ccb723ab84b2d7c83c60b1ed2cfe237c044b5a6bf3ff30e", 0x6f, 0x4}, {&(0x7f0000000180)="efa7afdf5343ec20c2e3cffd38377c5a258651fad296f8c06aabf6c54cdd288624fdc5903365c537fe7c11cce762184bd9417bd4a87d3e14d9e975f559a5554e015f59f23e3e80e981bd16e3c3f22caef83cfbf237899dcac765bd0e790d7cd91dc5b141acb63752ad194ac8de22cef74278e52c97c20768dc70d43197aa9421dbb368858d09b99584b0238b6a27ed70a10ccb2f3eaa85f57e5987bde0015db47e2ec9c9f4cb72400f53438b64dbe3d13604870e645dbed4dc1af683f772e83c78f9ea7c4eaf58fbbb7c80389c50f0c8a7171164c7a34747c5", 0xd9, 0x9}, {&(0x7f0000000280)="a4b29485518519a069f2d68aabd3bd889b3f00580ab8571c357b8f6ea7e79239fd4d6179e73c97f0aeffea6845c7bc1ea47debb1152945", 0x37, 0x2}, {&(0x7f0000000340)="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", 0x1000, 0x5}], 0x80000, &(0x7f0000001440)={[{@gid={'gid', 0x3d, r1}}, {@file_umask={'file_umask', 0x3d, 0x7}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, "73797374656d776c616e311828"}}, {@appraise='appraise'}, {@subj_user={'subj_user', 0x3d, 'hfs\x00'}}, {@euid_eq={'euid', 0x3d, r2}}]}) 07:48:40 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xbc01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3178.063817] hfs: unable to parse mount options 07:48:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8035, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3178.161080] hfs: unable to parse mount options 07:48:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x88caffff00000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:40 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xffffffffc7690dfb, 0x100) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x1fd, 0x0, &(0x7f0000ffb000/0x3000)=nil}) sysfs$2(0x2, 0x6, &(0x7f0000000100)=""/132) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) [ 3178.323566] hfs: can't find a HFS filesystem on dev loop1 07:48:40 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3d01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x7000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:40 executing program 1: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, &(0x7f00000001c0), 0x88000, &(0x7f0000000300)=ANY=[@ANYBLOB="ff"]) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000005c0)) lsetxattr$security_ima(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000680)='security.ima\x00', &(0x7f00000006c0)=@ng={0x4, 0x12, "0230cb1e"}, 0x6, 0x10002) mkdir(&(0x7f0000000500)='./file0\x00', 0x1) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000000000000, 0x4, &(0x7f0000000440)=[{&(0x7f0000000100)="19e403ccebaf96bb2654a0dff725b27ccc68d359b6519cf43a0e01d1e3ef4915653edb43074e26f72d0412dc7e880231381bc1876d1a925af9e1258a796f28d95812483491e29849a2b54b37b0006ef0", 0x50, 0x38de}, {&(0x7f0000000180)="b0fbebd33744081d32a18afb5450b3f2ad78e2514fed3866fa64d56aa6906d98db76a6aa8bf943075cdd26b51bea2ad990e4279c97c8b3e783889ec1ceb5d5064c6b6e5329ec31de30cea5fc330bfc85d22dc81251fd1df50137882bd1b4face399a8f32b83a1822a6d282723091876a87ea44a4a738f944151c49240fbab75df7cd6d12f82b6d5044711ee943b99cc4021b4c90df6a917a79759a9c7e5be7f852121a2478c5c973163b898845e92ee832b87286759a871d0b4396d52d4f82b3df88e0d75f4f94a17cbca212ef03389bb064", 0xd2, 0x3a}, {&(0x7f0000000280)="f2937b9357935b308d9a", 0xa, 0x6}, {&(0x7f0000000340)="a0951b57acb4547d754771293a59aff654405bba850a38af6afb1addefd76bc89caa33a2e44edb177d60fee2e1c27abb4780c29ea4838e7b28f2affe1066d04f34bb16454e5158360d22579c8ecc53b573a743a13cc5f0c4b7bbaf705861d89010c1f2984db8d49e6406f9671a84ade0172cc56e039a71868159b535d6a69d10fe1a1ce996a4b3a37ed47999625e5a2c11248185eda48dd5e2af51da525f4fab87212de1341f5ddd6f2711554b454b8060bbcbc62a25fb1ff53d46e26e828847e801f466fc0552ba5479a316bae743322e976f67fc58845bdabf4af792b84437e94457bc7a2b4c9fb4b8", 0xea, 0x74}], 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) 07:48:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x800e0000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3178.840312] XFS (loop1): unknown mount option [lazytime]. 07:48:41 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r2, r0, 0x8000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23, 0x7}, 0x1c) flock(r1, 0x2) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x2, 0x160, [0x200004c0, 0x0, 0x0, 0x200005c0, 0x200005f0], 0x0, &(0x7f0000000000), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x1000000b, 0x0, 0x0, 'e_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [], @dev, [], 0xa0, 0xa0, 0xd0, [@m802_3={'802_3\x00', 0x8}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1d8) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:41 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9f010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x28, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 3178.948339] XFS (loop1): unknown mount option [lazytime]. 07:48:41 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xc00, 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x7, 0x2) 07:48:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="c700070000000100090002008ad405000000cb05211201d47d435d40f8268a630a08529d3297b5c0880ceb0b9a4a161ece2a4d2bdfebbdc80176950e6c8d50ba2db6134ee7cc926a92ad8bc2c6fe570e9d0ef412a7a3e7cdf6dd952b2e9fd308b7d596034587b5b95f018549a48ed9c9ef0e02b8b2"], &(0x7f0000000100)=0x16) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYBLOB="08000800ce001c0000cc00539b79a32df49472e381c48d72f924f9d5"], &(0x7f0000000180)=0x18) listen(r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x800e, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3179.129987] hfs: can't find a HFS filesystem on dev loop1 [ 3179.158814] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:41 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9200, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3179.184307] hfs: can't find a HFS filesystem on dev loop1 07:48:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x43050000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:41 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400800, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$TIOCEXCL(r0, 0x540c) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) syz_read_part_table(0xa78, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="886a6018ede5dfce322fc00f548fdb7cb3f14fdf9d0c3256b3a92a4e053eb90f1c11c5c0ed1c42fedb8331bab9d348c53f5d8fd5488363beef9522423f6971ab94b95d694e4d3791f91b4d8a", 0x4c, 0x2}]) 07:48:41 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa701, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3179.421599] hfs: can't find a HFS filesystem on dev loop1 [ 3179.516341] Dev loop1: unable to read RDB block 5 [ 3179.521271] loop1: unable to read partition table [ 3179.521359] loop1: partition table beyond EOD, truncated [ 3179.538216] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 3179.588375] hfs: can't find a HFS filesystem on dev loop1 07:48:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x88470000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:41 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1b, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:41 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) rmdir(&(0x7f0000000080)='./file0\x00') r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f00000000c0)=0x9) 07:48:41 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xe8030000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3179.944915] hfs: can't find a HFS filesystem on dev loop1 07:48:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) sched_setparam(r3, &(0x7f0000000140)=0x3) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x6) listen(r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x1000109000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3180.023148] hfs: can't find a HFS filesystem on dev loop1 07:48:42 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x91, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:42 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="e0"]) 07:48:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xe0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3180.150622] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 3180.253797] hfs: unable to parse mount options 07:48:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8035000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:42 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa001000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3180.340306] hfs: unable to parse mount options 07:48:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x3c00000000000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:42 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x602000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) readlinkat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/170, 0xaa) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="70fbf5447ad49f45993848283a36f7a7d1e9e26a4d044be845fa6ce4efcec6df78d99ce92be5ed1bd34a5c94f8f2bf1bc1084ef2040262e6bf2a55fd58de07000000000000003c4563b3950a0d4beb1747bd55a3dee011fcc9531b838cc6194c5fd9936c51"]) [ 3180.545871] hfs: unable to parse mount options 07:48:42 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c010000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x700, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:42 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb5010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:43 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="747970658dd79b09f92c00"]) 07:48:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x806, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:43 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa400, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3181.030575] hfs: unable to parse mount options [ 3181.087216] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3181.114974] hfs: unable to parse mount options 07:48:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x3, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:43 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000000, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:48:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:43 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3901, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3181.273744] hfs: can't find a HFS filesystem on dev loop1 07:48:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x6488, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3181.346090] hfs: can't find a HFS filesystem on dev loop1 07:48:43 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:43 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:48:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8848, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:43 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4e, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3181.877792] hfs: can't find a HFS filesystem on dev loop1 07:48:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x8864, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:44 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x161, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3181.980388] hfs: can't find a HFS filesystem on dev loop1 07:48:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000140)=0x8, &(0x7f0000000180)=0x2) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000015c0)={'bond_slave_1\x00', 0x0}) recvmmsg(r3, &(0x7f00000047c0)=[{{&(0x7f0000001e00)=@l2, 0x80, &(0x7f0000002240)=[{&(0x7f0000001e80)=""/114, 0x72}, {&(0x7f0000001f00)=""/76, 0x4c}, {&(0x7f0000001f80)=""/81, 0x51}, {&(0x7f0000002000)=""/10, 0xa}, {&(0x7f0000002040)=""/227, 0xe3}, {&(0x7f0000002140)=""/228, 0xe4}], 0x6, &(0x7f00000022c0)=""/90, 0x5a, 0x3}, 0x1}, {{&(0x7f0000002340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000002880)=[{&(0x7f00000023c0)=""/193, 0xc1}, {&(0x7f00000024c0)=""/105, 0x69}, {&(0x7f0000002540)=""/159, 0x9f}, {&(0x7f0000002600)=""/97, 0x61}, {&(0x7f0000002680)=""/24, 0x18}, {&(0x7f00000026c0)=""/35, 0x23}, {&(0x7f0000002700)=""/157, 0x9d}, {&(0x7f00000027c0)=""/32, 0x20}, {&(0x7f0000002800)=""/63, 0x3f}, {&(0x7f0000002840)=""/53, 0x35}], 0xa, &(0x7f0000002940)=""/118, 0x76, 0x7}, 0x1f}, {{&(0x7f00000029c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002a40)=""/134, 0x86}, {&(0x7f0000002b00)=""/187, 0xbb}, {&(0x7f0000002bc0)=""/162, 0xa2}], 0x3, &(0x7f0000002cc0)=""/234, 0xea, 0xff}, 0x1}, {{&(0x7f0000002dc0)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000003240)=[{&(0x7f0000002e40)=""/90, 0x5a}, {&(0x7f0000002ec0)=""/62, 0x3e}, {&(0x7f0000002f00)=""/215, 0xd7}, {&(0x7f0000003000)=""/244, 0xf4}, {&(0x7f0000003100)=""/254, 0xfe}, {&(0x7f0000003200)=""/44, 0x2c}], 0x6, &(0x7f00000032c0)=""/70, 0x46, 0x3}, 0x1}, {{&(0x7f0000003340)=@l2, 0x80, &(0x7f00000034c0)=[{&(0x7f00000033c0)=""/213, 0xd5}], 0x1, &(0x7f0000003500)=""/48, 0x30, 0x6}, 0xffff}, {{&(0x7f0000003540)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000046c0)=[{&(0x7f00000035c0)=""/176, 0xb0}, {&(0x7f0000003680)=""/6, 0x6}, {&(0x7f00000036c0)=""/4096, 0x1000}], 0x3, &(0x7f0000004700)=""/166, 0xa6, 0x2}, 0xc9}], 0x6, 0x2000, &(0x7f0000004940)={0x0, 0x1c9c380}) accept$packet(r2, &(0x7f0000004980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000049c0)=0x14) getsockname$packet(r2, &(0x7f0000005f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005f80)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000006280)={0x0, @multicast2, @multicast2}, &(0x7f00000062c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000006300)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000006380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000006480)=0xe8) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f00000064c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000006500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000006540)={{{@in6=@loopback, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000006640)=0xe8) accept$packet(r2, &(0x7f0000006680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000066c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000006c80)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000006cc0)={0x0, @loopback}, &(0x7f0000006d00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000006d40)={{{@in=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000006e40)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000006e80)={@mcast1, 0x0}, &(0x7f0000006ec0)=0x14) getsockname$packet(r2, &(0x7f0000006fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007000)=0x14) accept4$packet(r2, &(0x7f0000008f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008fc0)=0x14, 0x800) accept4$packet(r2, &(0x7f00000091c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000009200)=0x14, 0x80000) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000092c0)={@dev, @multicast1, 0x0}, &(0x7f0000009300)=0xc) getpeername$packet(r2, &(0x7f0000009340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000009380)=0x14) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000093c0)={'veth1_to_team\x00', 0x0}) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000009400)={@remote, 0x0}, &(0x7f0000009440)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000009480)={0x0, @multicast1}, &(0x7f00000094c0)=0xc) getpeername$packet(r2, &(0x7f0000009500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009540)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f0000009580)={@mcast1, 0x0}, &(0x7f00000095c0)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f000000aec0)={0x0, @dev, @loopback}, &(0x7f000000af00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f000000af40)={{{@in6=@ipv4={[], [], @loopback}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f000000b040)=0xe8) getsockname$packet(r0, &(0x7f000000b080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b0c0)=0x14) accept(r3, &(0x7f000000b100)=@ll={0x11, 0x0, 0x0}, &(0x7f000000b180)=0x80) getsockname$packet(r3, &(0x7f000000b1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b200)=0x14) accept4$packet(r2, &(0x7f000000b280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b2c0)=0x14, 0x800) getsockname$packet(r2, &(0x7f000000b3c0)={0x11, 0x0, 0x0}, &(0x7f000000b400)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000b440)={0x0, @multicast2, @broadcast}, &(0x7f000000b480)=0xc) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f000000b900)={@empty, @multicast1, 0x0}, &(0x7f000000b940)=0xc) accept(r1, &(0x7f000000b980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ba00)=0x80) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000d480)=[{&(0x7f000000d400)=""/5, 0x5}, {&(0x7f000000d440)}], 0x2, &(0x7f000000d4c0)=""/84, 0x54, 0x80000000}, 0x40010020) getsockname$packet(r2, &(0x7f000000d580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000d5c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f000000e380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f000000e340)={&(0x7f000000d600)={0xd08, r4, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0x1d8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x1, 0x9, 0x105, 0x2}, {0x5, 0x0, 0x3, 0x2ab}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x1ec, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r15}, {0x22c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffe}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x158, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x411}}, {0x8, 0x6, r23}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r24}, {0x1a0, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r25}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r27}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r28}}}]}}, {{0x8, 0x1, r29}, {0x180, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r30}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x545f, 0xffffffffb3dad06b, 0x6, 0x1}, {0x77, 0x5, 0x1, 0x1000}, {0x8, 0x7ff, 0x0, 0x9}, {0x6a8db0c6, 0x101, 0x2, 0x9}, {0x6, 0x1, 0x1, 0x7}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r32}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r33}, {0x148, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r34}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r35}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x1ff, 0x1ff, 0xc7, 0x8}, {0x5, 0x0, 0x9, 0x100000000}, {0x1ff, 0x6c04, 0x0, 0x4}]}}}]}}, {{0x8, 0x1, r36}, {0x4}}, {{0x8, 0x1, r37}, {0xf8, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r38}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r39}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r40}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}]}}]}, 0xd08}, 0x1, 0x0, 0x0, 0x20008840}, 0x40001) r41 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000100)={0xcfae, 0x9fe1, 0xff, [], &(0x7f0000000040)=0x3}) setsockopt$inet6_tcp_TCP_CONGESTION(r41, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r41, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x14, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:44 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="747970653d65dd24f91000"]) 07:48:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x1f4, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:44 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd601, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3182.174687] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3182.202318] hfs: type requires a 4 character value [ 3182.213207] hfs: unable to parse mount options [ 3182.288097] hfs: type requires a 4 character value [ 3182.293235] hfs: unable to parse mount options 07:48:44 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x3c000000, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:44 executing program 1: r0 = open(&(0x7f0000000080)='./file1\x00', 0x2, 0x48) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:48:44 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1d6, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0xf401, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3182.774114] hfs: can't find a HFS filesystem on dev loop1 07:48:44 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb4010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3182.852518] hfs: can't find a HFS filesystem on dev loop1 07:48:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x2c, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:45 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) prctl$setfpexc(0xc, 0x20000) r0 = semget$private(0x0, 0x3, 0x10) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000080)=""/1) 07:48:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710}, 0x10) listen(r2, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000003c0)='dctcp\x00', 0x2) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3183.051948] hfs: can't find a HFS filesystem on dev loop1 07:48:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:45 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x79010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3183.110311] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3183.134651] hfs: can't find a HFS filesystem on dev loop1 07:48:45 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:45 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="747971653db9b104b0fbee65ae8640ef65dd24f10e20"]) 07:48:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x3c, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:45 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7b000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3183.605970] hfs: unable to parse mount options 07:48:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:45 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3b00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3183.701587] hfs: unable to parse mount options 07:48:45 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f00000000c0)='./file0\x00', 0xf0, 0x4, &(0x7f0000000340)=[{&(0x7f0000000100)="6e29dc03e412", 0x6, 0x3}, {&(0x7f0000000140)="d062a3f08e0bc1e01dfd59ee6137bdf0612d8208c82b87e9f853177f986ac45bdb3690025157dddd97ac80bbadae717a804d6544ee75eaca638739775f66dadae8576257b5664d6b2dea54844da0683dcffa294322013bb1c526013b28ac9cf8cf1dc3942287c9c508e9eb31d53c7559c98f4129cdeab6896b216d86167d375e9e90406b5132a7e3f5a1d9b63be91ecf1bfc1f4263ffefac60f2e8adb24b3d3cbf18f16d04", 0xa5, 0x2}, {&(0x7f0000000200)="42bf891edeffac4467552c421994273438963774c4f967c526b3332c8164e1c231541fe2322741866c6acf4bed5d18e4dc625dd29a", 0x35, 0x36ba}, {&(0x7f0000000240)="9e52b43d152534f86c79c15732785272f4e69aad28984d4be9fd7c487d4b15c652c0c93f76ba450e3e9256a926176a3edd30fe9d683ac96b34ad19a3bc4256796658951a5834156a73cfb6203aaccbbc00116206848e98505c35333f6e42674a7329baf65e741e7ca41440e0d77fbec28f5afcfc36c1b944042a502db5e8e780ee5051fc3b4a04ba59", 0x89, 0x9}], 0x1010, &(0x7f00000003c0)={[{@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@fsname={'fsname', 0x3d, 'keyring'}}, {@appraise='appraise'}]}) 07:48:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3183.865121] hfs: can't find a HFS filesystem on dev loop1 07:48:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, &(0x7f0000000100)="6aea84752d27fd52b32303a210c47fe201d349435be56c8a2734af903314f6f93b9a16a1b1a85da4a79dad2db3e5492ca0ff4bb26b97007512e3eb15a0fbe5bb790e30077887e11a75cef80cf0510c70860e9033da168f296fbc7b8dfd29f3d95caeabf2137fac98f44d3690d3dec8f954ce31404261b8f8cfab213d9d20c05c651f34d703ee6000cd5ad5d637043985db5c97defd119d6239c7172301ce888b4ce713e59d00a4b936e51a2d2b", 0xad, 0x4000, 0x0, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/76, 0x4c}], 0x1, &(0x7f0000000280)=""/49, 0x31, 0x9}, 0x40000000) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000300)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000340)=r4) 07:48:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x3a, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:46 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa600, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3184.025807] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3184.062691] hfs: can't find a HFS filesystem on dev loop1 07:48:46 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:46 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="747970653d65dd24f92c00060000004765bfe5d0331fc291a8cb41b2efac8572076bb1e953c0801acd7b8dc81a46efc71f3bbc52b7"]) 07:48:46 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x38, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x2b, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3184.527277] hfs: can't find a HFS filesystem on dev loop1 07:48:46 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1e6, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3184.632919] hfs: can't find a HFS filesystem on dev loop1 07:48:46 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x80080, 0x0) dup(r0) [ 3184.807527] hfs: unable to parse mount options 07:48:46 executing program 3: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3184.879830] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3184.891301] hfs: unable to parse mount options 07:48:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000e80, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:47 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xeb, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:47 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000000c0)) 07:48:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000300, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:47 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:47 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3101000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9008864, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3185.411316] hfs: can't find a HFS filesystem on dev loop1 [ 3185.488722] hfs: can't find a HFS filesystem on dev loop1 07:48:47 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8e000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9008847, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:47 executing program 1: fstat(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{@type={'type', 0x3d, "65dd24f9"}}], [{@measure='measure'}, {@dont_measure='dont_measure'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', r0}}, {@uid_gt={'uid>', r0}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}]}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x3, 0x0, [], [{0x0, 0xc96, 0x1ff, 0x2, 0xd8b, 0x80000000}, {0x2, 0x7, 0x84f1, 0x1, 0x5, 0x9}], [[], [], []]}) [ 3185.642007] hfs: unable to parse mount options 07:48:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f00000001c0)=0x5a62, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xd4, "ede252b9541b8b442218d9de5b15e60542e346e2b60df1405ae134f61e6ebfa7ed6b1d3b62617e26fe65ff7e233f4e14356c88570e299f54130902bf5215d33d70b722c50f6edd10a5621b8914fb2c30bb7c0df1ee339ab4241605eb04e0d83299cf8e3eb7595abd0b4ba7221d161252e8b8fa7caf55733d8c64cce7b432c90d06f03ca426ceb146e11f816208d2c54ae7de6e89c3d1df57e77fd2d593e415626ea2d82489b16c8a65e618c0e3d6888bc9cc35f136c89559d8353a0f2e6efcd7988ce356d39b65f5becaad6cc11d11c128fb1b12"}, &(0x7f0000000340)=0xdc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e21, 0x3000000, @local, 0x9}}, 0x9d, 0x5}, &(0x7f0000000440)=0x90) listen(r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000480)) sendto$inet6(r2, &(0x7f0000000580)="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", 0x1000, 0x8000, &(0x7f0000000040)={0xa, 0x4e24, 0x3f5, @loopback, 0x1}, 0x1c) 07:48:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9001400, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:47 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1d010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:47 executing program 1: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRES16=r0, @ANYBLOB="000128bd7000fcdbdf2502000000"], 0x14}, 0x1, 0x0, 0x0, 0x2400800e}, 0x20008000) syz_mount_image$bfs(&(0x7f0000000300)='bfs\x00', &(0x7f0000000340)='./file0\x00', 0x9, 0x4, &(0x7f0000000680)=[{&(0x7f0000000380)="1180827f88a3fa706631519577100b1ace6e04b969d2e03de22c791beba64aa0a890f58a92a137fe3f0d982b16ea3ef7e3e4421d973c0b522c99fc6ea27849b94a3a0111faaa0e23143b80100524c09d0d72566edfca8ebfa549fa8970707c8a70689f1e292385fa8a7d10feb6c52c70578197c58a6b3cd5271e01eddb8faaae0f2332e5eb9c128e27df37620fa44722b52a074e4b376f7c7b1e0cbbfb4879815c3ea4fff9158f06ec9d63f129744b87", 0xb0}, {&(0x7f0000000440)="ad6eb9fe798248e8c9680dfa463e6d94420828891b2852d52d744c0a8d178e8dcb47f622782ed33143433f55929f1bcd46d3c5b51b690c518eaf69c6dd077306bee9ab655945a6429829edacb83d6b31d23140e18148c8dbc688ec5208d6a559b004bee87b4823e4a994ed5c5eed1ffbdcbaaa2603125524e3298c600eae6280daa64e033dc4c14ff2d524d3ec277bfbd6c36f201372c37fd849b65ba73e68801fc2230c16bd5963b7aabe9239b08ef458364a246fd8f5e00629d96a14ffac00a4596c1de2e0e4505f09a0", 0xcb, 0x9}, {&(0x7f0000000540)="024bd0b7db760e5cfcd4bfcdcd6c6e71d0427aa096569a2c53056ff47bcbcbd9131c099cab8254ea861db828a6ed62aaa6691844b1bb8ee84b9c86f26b97c2977e3ede2515b73376", 0x48, 0x2}, {&(0x7f00000005c0)="25171b0048cf8e809973d3ede2217fd60b767c59023d1dcec80092d7ad1b989d54b25acf639617144cbe949f0a0a2fc387536eaa0ec1b9896d2f8e09a1cace7818ff70772ff47c040ff3738808ce7f5c895d04f6dc286350ff91a118766741f5a01abd9d9d256e287c89795a7fdb7f885eb35a1b50f74a0c972a6fa1ac36f98705dd1d95a455749059cc35e34b39d8e75114b98327c9733125ae78fc0b91cbd685b0661016229588961e63fdb536aa3fb1f2", 0xb2, 0xff}], 0x8000, 0x0) 07:48:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x900800e, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:48 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcff000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x4040, 0x3) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000140)=ANY=[@ANYBLOB="02ebe206f455001800000000"]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000340)={0x4, [0x0, 0x0, 0x0, 0x0]}) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0xc000000000000000, 0x4, 0x7}, 0x14) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x8, 0x9, 0x1, 0x80000001, 0x9}, 0x14) ioctl$TCFLSH(r2, 0x540b, 0xfffffffffffff3dd) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f00000001c0), 0x0, 0x20000003, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x800000, &(0x7f0000000580)={'trans=unix,', {[{@mmap='mmap'}, {@afid={'afid', 0x3d, 0x100}}, {@afid={'afid', 0x3d, 0x2}}], [{@uid_gt={'uid>', r5}}, {@subj_role={'subj_role', 0x3d, 'vmnet0user'}}, {@smackfsdef={'smackfsdef', 0x3d, 'yeah\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, 'vboxnet0\\md5sumGPL.security'}}, {@smackfsdef={'smackfsdef', 0x3d, "76626f786e6574303af124707070316b657972696e675c"}}, {@uid_lt={'uid<', r6}}, {@subj_type={'subj_type', 0x3d, 'yeah\x00'}}]}}) 07:48:48 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6500, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000014, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:48 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x81, 0x12080) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)) [ 3186.309184] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)="2a8934dd06f286af90e5d9158577a5766510de08a21d2d0228410ddb316acb9c396dd2b1264d6946230fabafd20759e11de7ba9924aeae07c2f34708fda16218b84889675991b23c1b22f811d50c000000000000210c9f1efc050e295745c95dc3e88f26a949bf7aae66bf2edc65516b6e665ec3f8c1f15cb9dd42a2f841573c59999e8e98649892f12250b85d235712aeed1dce99c23451c7672dc9df19a96bf25e6bf2cecfc08b3d732dd905", 0xad) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x900003c, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 3186.376724] hfs: can't find a HFS filesystem on dev loop1 [ 3186.447595] hfs: can't find a HFS filesystem on dev loop1 07:48:48 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7900, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x900e000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3186.488084] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9004888, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:49 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:49 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)) 07:48:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000806, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:49 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb601000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 3187.238967] hfs: can't find a HFS filesystem on dev loop1 07:48:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x4, &(0x7f0000000040)=[{0x0, 0x4, 0x5, 0x1}, {0xbd85, 0x100, 0xfffffffffffffffb, 0x7}, {0x80, 0x3, 0x900000000000, 0x1}, {0x7, 0x13, 0x8, 0x9}]}, 0x10) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000008, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:49 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x54000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3187.355415] hfs: can't find a HFS filesystem on dev loop1 [ 3187.372086] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x90001f4, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:49 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x2, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:48:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 3187.612995] hfs: can't find a HFS filesystem on dev loop1 [ 3187.693814] hfs: can't find a HFS filesystem on dev loop1 07:48:50 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9008848, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:50 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9c00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:50 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:50 executing program 1: syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="aa306c290a5c7299c19b84cc5efd0ea13e49519ed56382498f50adeddfbf6e05e7cf81534027a8dbc7b8e51c8ed73f0699dcfd38255833aaac87", 0x15, 0xffff}, {&(0x7f00000000c0)="6715333d8d9b9cc7043e05622222495a9717e3b67e2f2453da9d1b04ed7c326aa5df61137771a9eccc9fdde2cf311ab2", 0xfffffffffffffe7f, 0x6}], 0x0, &(0x7f0000000300)) 07:48:50 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000100)={'security\x00'}, &(0x7f0000000040)=0x54) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9004305, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:50 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:50 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6c00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9006000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3188.353087] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000028, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3188.476322] hfs: can't find a HFS filesystem on dev loop1 07:48:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:50 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:50 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9000000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000007, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:51 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0xb}, @loopback, @local, 0x2, 0x1, 0x81, 0x100, 0x38, 0x400000, r1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r4, 0x88b) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r5, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x707}, 0x1c) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000040)) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000100)=""/80) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) 07:48:51 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="747970653765dd24f92c00"]) r0 = getuid() r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x100000001, 0x40100) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000340)) getdents64(r1, &(0x7f0000000180)=""/242, 0xf2) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_POLL(r1, &(0x7f0000000280)={0x18, 0xffffffffffffffda, 0x5, {0x3}}, 0x18) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000440)={r3, r0, r2}, 0xc) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000002c0)={0x2, 0x1ff, 0x9, 0xff, 0xf3dd, 0x3}) 07:48:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9008035, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:51 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe800, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3189.220352] hfs: unable to parse mount options 07:48:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x90000f0, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 3189.304228] hfs: unable to parse mount options 07:48:51 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xab, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000100)={0x5, 0x3, @raw_data=[0x1000000, 0x1f, 0x1, 0x3aa2, 0x9, 0x0, 0x10001, 0xffff, 0x4800000000000, 0xffffffffffff5a9e, 0xffff, 0x6, 0x9, 0x7, 0x40]}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x90100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x138, r4, 0x108, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x1e}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x8}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x61}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffff16}]}, 0x138}, 0x1, 0x0, 0x0, 0x10}, 0x4000004) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x10000) 07:48:51 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:51 executing program 1: acct(&(0x7f0000000100)='./file0\x00') r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='\x00', 0x0, 0x2d, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x1015, 0x6, 0x1000, "1dd82886b691b92ab0573d3b06c75929", "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"}, 0x1015, 0x2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x480800, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 07:48:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000700, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8001, 0x10000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6(0xa, 0x800, 0x8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x10000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:51 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa600000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x900f401, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:51 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7479829a551dc6dfb56e5e"]) 07:48:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:52 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd8000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3190.057243] hfs: unable to parse mount options 07:48:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x900000b, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0xfffffffffffffffe, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x200, 0x80) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000000c0)={'syz_tun\x00', {0x2, 0x4e23, @remote}}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 07:48:52 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:52 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9800, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x900000d, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="74787065f92c0000000000"]) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) ptrace$peekuser(0x3, r1, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), 0x4) 07:48:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x0, 0x0, 0x3}, 0x2}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000180)={0x17, 0x7, 0x2, {{0xa, '/dev/full\x00'}, 0x3ff}}, 0x17) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_execute_func(&(0x7f0000000140)="262e0f5f3bc482759ecbd8d6c4419816d8c4a2dd8ea1fa0100002e440fc39868e3c488c423c978b41f00000081d344022c42660f3a61590a67c4e3255cea00") setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3190.742061] hfs: unable to parse mount options 07:48:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x900f000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000100)={0x1, 0x1c, [0x0, 0xfffffffffffffff8, 0x0, 0x100000000, 0x3, 0xffffffffffff7fff, 0x400]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3190.805451] hfs: unable to parse mount options 07:48:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7479ffff00000000000000"]) 07:48:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9004000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3190.874069] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:53 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x11c, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3191.039703] hfs: unable to parse mount options 07:48:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9008906, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3191.156291] hfs: unable to parse mount options 07:48:53 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x90000e0, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:53 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb3010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:53 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x80000000, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'ip6tnl0\x00', @random="cce849d8de48"}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x8, {{0xa, 0x4e21, 0x9, @ipv4={[], [], @remote}, 0x1}}, 0x1, 0x6, [{{0xa, 0x4e23, 0x6, @empty, 0x8bf}}, {{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0xf}, 0x4}}, {{0xa, 0x4e24, 0x401, @dev={0xfe, 0x80, [], 0x13}, 0x1}}, {{0xa, 0x4e24, 0x3, @mcast2, 0x9}}, {{0xa, 0x4e22, 0x5, @local, 0x40}}, {{0xa, 0x4e24, 0x2, @remote, 0x9ee8}}]}, 0x390) r1 = msgget$private(0x0, 0x400) msgsnd(r1, &(0x7f00000001c0)={0x3, "2762d18a1a842ca2f33318b1d16aa40bb76bf2ab1f9abc3652433ac257ac6b13aa8ff7e787d075901117d00fb3dbcb63391d1eb1d5535e1a44a4ed4a89f8395cddda63487de09afa8302973769161b2de76b64cb887ab6a84b7331e342290d35f5e2b4a5b94e77ba7fd3949fad9bc940033e7b823a6066b56f3dca273bcc87407feff413c898eb02a455ece52544ab555b68358b3def98e2e886c5c5d6adc7b9a6ec"}, 0xaa, 0x800) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="e0441d60b952e4432f2e", 0xa, 0xfffffffffffffffb) keyctl$setperm(0x5, r2, 0x1201204) 07:48:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9003580, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x7, 0x96f, 0x8001, 0x3, 0x0, 0x9, 0x4a46, 0x0, 0x20, 0x9, 0x40, 0x6cc, 0x6, 0xfffffffffffffff8, 0x9, 0x8000, 0x8, 0x80000001, 0x20, 0x5, 0x4, 0x8, 0x8f0, 0xa40, 0x7280, 0x80000000, 0x0, 0x80000000, 0x9, 0x2, 0xffffffff, 0x5, 0x8, 0x1, 0x5, 0xad2, 0x0, 0xfffffffffffffff9, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x304, 0x7, 0xae7b, 0x7, 0x7ff, 0x8, 0xb91}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3191.654669] hfs: can't find a HFS filesystem on dev loop1 [ 3191.730813] hfs: can't find a HFS filesystem on dev loop1 07:48:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000543, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3191.773678] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:53 executing program 1: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x40008, &(0x7f0000000300)) 07:48:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000d00, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:53 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4d00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9003c00, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:54 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x2000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x1f}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={r1, 0x10001, 0x1, 0x100, 0x7fffffff, 0x2, 0xffff, 0xcd7b, {r2, @in6={{0xa, 0x4e20, 0x100000001, @dev={0xfe, 0x80, [], 0x1c}, 0x3}}, 0xb56, 0x7, 0xff, 0x3, 0xfffffffffffffffb}}, &(0x7f0000000200)=0xb0) 07:48:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000003, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:54 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:54 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2400, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:54 executing program 1: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xaaaaaaaaaaaac21, &(0x7f0000000180), 0x0, &(0x7f00000000c0)={[{@umask={'umask', 0x3d, 0xfffffffffffffff8}}]}) 07:48:54 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x260e, 0x8200) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000001c0)={0x8000, 0x1, 0x3, 0x5}, 0xc) socketpair$unix(0x1, 0x8002012001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(0xffffffffffffffff, r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xfffffffffffffffe, &(0x7f0000000140)=0x205, 0xf1) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000100)={0x2, &(0x7f0000000040)=[{}, {}]}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0xfd9, 0x10}, &(0x7f0000000300)=0xc) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000340)={r4, 0xc6, 0x400, 0x8}, 0x10) listen(r3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000380)=0x5, 0x4, 0x1) sendto$inet6(r5, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) name_to_handle_at(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x14, 0x0, "a5894d74e1dbea6a11fd0cc6"}, &(0x7f0000000280), 0x400) 07:48:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000689, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3192.691103] hfs: can't find a HFS filesystem on dev loop1 [ 3192.725362] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:54 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9700, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x90003e8, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:54 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer2\x00', 0xc2900, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in, 0x4e22, 0x0, 0x4e21, 0x0, 0xa, 0x0, 0x80, 0xff, r1, r2}, {0x4, 0xfffffffffffffff9, 0x7, 0x9, 0x9, 0x6, 0x3, 0x7}, {0x8, 0x2, 0x1, 0x8}, 0x5, 0x6e6bb5, 0x3, 0x1, 0x0, 0x2}, {{@in6=@local, 0x4d5, 0x3e}, 0xa, @in6=@loopback, 0x3507, 0x2, 0x3, 0x8, 0x2, 0x1000, 0x1}}, 0xe8) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="74e5206ce13b2980ad2c00"]) r3 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x200000) sendto(r3, &(0x7f0000000200)="09c9cafd", 0x4, 0x4000, &(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000340)={0x0, 0x7ff, 0xfff, 0x8, 0x9f, 0xaf, 0x1ff, 0xfff, {0x0, @in={{0x2, 0x4e20, @loopback}}, 0x4, 0x2000000, 0x4, 0x1fffffffc0, 0x7}}, &(0x7f0000000400)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in6={{0xa, 0x4e21, 0x6, @remote, 0x8}}, 0x1, 0x5}, &(0x7f00000002c0)=0x90) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000001c0)={r5, 0x7fffffff, 0x5, 0x3}, 0x10) 07:48:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000004, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9006488, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3192.948783] hfs: unable to parse mount options 07:48:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000600, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3193.008399] hfs: unable to parse mount options 07:48:55 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:55 executing program 1: setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x3ff}, 0x28, 0x2) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="747970253dfd07f3ea2c00"]) 07:48:55 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) [ 3193.403601] hfs: unable to parse mount options 07:48:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x5) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9002800, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3193.571441] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:55 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x6, 0x8, 0x1, 0x60dca0b9, 0x1, 0x9, 0x8, 0x24e, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r1, 0x530f6d86}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x8ed5, 0x100000000, 0x8, 0x9, 0x6, 0x1f, 0x2, 0x4800000, r1}, &(0x7f0000000200)=0x20) 07:48:55 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x222c, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000b00, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9004788, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3193.764326] hfs: can't find a HFS filesystem on dev loop1 07:48:55 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2901000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000006, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3193.881884] hfs: can't find a HFS filesystem on dev loop1 07:48:56 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7479ce00f6000000000000"]) 07:48:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000608, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3194.031961] hfs: unable to parse mount options [ 3194.111180] hfs: unable to parse mount options 07:48:56 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c01000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:56 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x205, 0xfffffef2) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:56 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xfeffffff, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3194.472656] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x900e803, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:56 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='type', &(0x7f0000000140)='type', &(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='type'], &(0x7f0000000340)=[&(0x7f0000000240)='ppp0!{)\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='vboxnet1*\x00']) 07:48:56 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3e00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9008100, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3194.635919] hfs: can't find a HFS filesystem on dev loop1 07:48:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000060, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3194.703837] hfs: can't find a HFS filesystem on dev loop1 07:48:56 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = getgid() syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file1\x00', 0x8, 0x8, &(0x7f0000000600)=[{&(0x7f0000000100)="eab9d1721ecc7194116129a64f45a628bdaee96d18a7ad22aa51a467a41761898f3ee8bb8dec363402ff28cc3f78e2e4a98d78f78c75077966d0669f3b809c330960b830c359a4333a3d2a6b157a88c912a9c1ea11404c2a2cb6b5ee2d72ccfeacebda8bce6f8f3207", 0x69}, {&(0x7f0000000180)="831176aec5c8bbf31cdc21fdcfcc25a3bd14db841427fb35b91497d9ac7e8c524bad50252392bd7d964aa3a74616470f8e822e7a9a02133756cf656f58eebaa4756c41163d1127d160f6499cca1798f525b78b138181ef00520428791dd8da7e70", 0x61, 0x5}, {&(0x7f0000000200)="593472af606bb5fa600b227420bd58e76cab42e15d72323ed2a4801d0329113b0dbe83d377ae0042c0dbaeb8ce845f95120af0089c371e18efa790c86edd83312acc7ce2d497b282bb66e6e4569424ebbf0733866d1a0b6d949d7b24498e51a9611555a39d1951497f6a6a982cce47749be9d9cf3d9470f28e95743ac24c66bde79ee8c53856cdf94a60a4c61fc475f02c319313e9e4d0a435b6d0df5b4849728821856ee05881af330d012516948b6939d0d9", 0xb3, 0x7fffffff}, {&(0x7f0000000340)="c3689396a4f0cfeab4da25f84ac40d94b1c5e29207b116fa0eaca15de2aeec9757647c48b1db1c9b4b03188a9b76266580468d975b5701deaaa1883552f87c1495da27f7cfa903e4d39710c660ae5a0c95139e967cf49748", 0x58, 0x6}, {&(0x7f00000003c0)="c1ac4d8b0473efb2a4b1b133c98971e1d4ee7fd0822741c51fc4522b283364db3398b69b983fa6569f337d13194ad1aeadb60f63bfa05af247ab53bf017faa216ad221b221dbd4d342e1701d148120076f84af6b35c1397cfae3ba3a373c204d76e6d1ff98e3178ef08dc4fd5aac5f08920733e0771e1144370ade7e8ba833cebd6dcde6", 0x84, 0x9e2}, {&(0x7f00000002c0)="725dcb927d4c72b0eec4e7c23d2b3cac058e9a1e0df13a9f70144a8eab", 0x1d, 0x5}, {&(0x7f0000000480)="9ccdd3ce5ce5643da337a20baf1fd5feef0f49bd9f446ddaab4e49bd39ba06e797830adf18ee9897649b9c1224ec2d3b3aaa737c55d0abcf45464a2d7c903c9110e00b6683b0635fe95c74b0d47d9e529135e11f9cdd5e0cfca3a415ed1ec3c085e2d3d95f0b936b", 0x68, 0x8}, {&(0x7f0000000500)="1550307971dd8f365c4750e0bf775cb588b7ee9c681f74770efc849f616a631a8fc3bdf4120a53b2614e1f0ca11f41282a081fcd1db631b514aeefb9013e0a9995ea78f3450df4a9e4fcfa12ebd81cfa466712a2d4202b28acdcec013d2876708a640b449bf419cfbd603af18e18245292b8a6277457055236b801fd5e41bceb1c3bde61c7548bde390bbc95a744325ce292a8da136eaea9bb813917049e75e91725846cbc94953b3236ee9847d2cee44aee1b40dcd188283e7ee005199c95034f591fa58f4ef9471a4697a89d373b80b9a5737b4d47474923fef0c9248640f9cf27b5d1db51", 0xe6, 0xffffffff}], 0x2, &(0x7f00000006c0)={[{@fat=@gid={'gid', 0x3d, r0}}, {@dots='dots'}, {@fat=@debug='debug'}, {@dots='dots'}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@showexec='showexec'}, {@nodots='nodots'}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@hash='hash'}, {@hash='hash'}, {@subj_user={'subj_user', 0x3d, 'type'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@subj_type={'subj_type', 0x3d, '-*/&'}}, {@fsname={'fsname', 0x3d, '-!'}}, {@audit='audit'}, {@subj_type={'subj_type', 0x3d, 'type'}}]}) 07:48:56 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe401, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3194.835570] hfs: can't find a HFS filesystem on dev loop1 07:48:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000002, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3194.938940] hfs: can't find a HFS filesystem on dev loop1 [ 3194.984191] FAT-fs (loop1): Unrecognized mount option "defcontext=unconfined_u" or missing value 07:48:57 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x2b}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3195.305833] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:48:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:57 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1bb, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:57 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7479702c89691812b9b864"]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='.\x00', r0, r1) 07:48:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0xffffff89}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3195.478976] hfs: unable to parse mount options 07:48:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x2b000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3195.528749] hfs: unable to parse mount options 07:48:57 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="741b040000008a2fb92c00dec23745187048dde31d2b035c7a76bf6904fb72a6152d991f97a5a9ca8f4495b1f39f73babede226704409cca6a2fecd914fcd3969d61fe78776827809bcbd0935335bb85458244ae2cd15a8eaae012eb6292d5f48a8e547cc137a9969dfb842ec0b6752fc1fa3fd0a2198431902e56863c8885344fb39c8b4bb22c1bc31316d6de0e427346920444495d43a01e2028dc4bfa577605dcc8c6ee109f48bd8bed1be089cac35dd4f451b052f6e4490c06760c5308ee075f4e68b9db3d6b264a7faf278c149602566f8a55d339911303e9babd4106000000000000008e25ed"]) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f00000001c0)={0x7, 0x81, 0x300f, 0x40, 0x8, {0x7fffffff}, 0x1}) 07:48:57 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x701, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x3a000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3195.689524] hfs: unable to parse mount options [ 3195.734093] hfs: unable to parse mount options 07:48:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x29}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:57 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0xe, &(0x7f0000000100), &(0x7f0000000140)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_crypto(0x10, 0x3, 0x15) dup3(r3, r1, 0x80000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r5, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:58 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/133) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x200000, 0x0) [ 3196.194900] hfs: can't find a HFS filesystem on dev loop1 [ 3196.212386] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3196.254144] hfs: can't find a HFS filesystem on dev loop1 07:48:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:58 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xcb, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0xffffff88}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:58 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x103000) socketpair(0x2, 0x80000, 0x0, &(0x7f0000000100)) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f00000000c0)={0x6, 0x7}) 07:48:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x89ffffff}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3196.420449] hfs: can't find a HFS filesystem on dev loop1 07:48:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x4000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:58 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x20010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3196.575339] hfs: can't find a HFS filesystem on dev loop1 07:48:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x4}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:58 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7479708e2e65dd24f92c00"]) 07:48:58 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) [ 3196.783786] hfs: unable to parse mount options [ 3196.863542] hfs: unable to parse mount options 07:48:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0xffffff84}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:59 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7700, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:59 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x141000, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f00000000c0)=0x6) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000100)="05cc518db88e38a1d5fe7af9f1ba451dbdb7f6c43367964b53f2cb1a9800c92bb17033f12031ee86210c", 0x2a) 07:48:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:48:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x2c000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:48:59 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9a01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3197.285082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3197.312192] hfs: can't find a HFS filesystem on dev loop1 07:48:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x6}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3197.365955] hfs: can't find a HFS filesystem on dev loop1 07:48:59 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="7272725228d2ae4f112715be343d696e7751c755a21ddc7a133c0ac32937521bb4d9c36724d25c86", 0x28, 0x7}, {&(0x7f0000000140)="7dc6baa08e06a0bad76078db545c644ae0101fbe47b3e4e42e63f6eef87d0db26384c7dc29989b76de13b0bbaab836b6a78a3fc146513b51cfa23aa91f24e2fb646513cd44a149cf9d510bfcf69a8bab6e0c4f9d5c0dda58c1c92685d002f989c2e3bb4bc285b07d7dc181bd27f5c70bfaa56ad66e6b11ea1e66f85b3b027e2609f8b94902a9f14e2baa622ad0da5d0b475b30f6ba9034c0500faffe57cd76ee609df03638d483ca6e05fd376c0c1c6f58800ef9d5047c94ad9cea93322b1b08caaa39c10b0c5cf86c4522a38ac96c48e73f60a959d0ce", 0xd7, 0x200}], 0x400, &(0x7f0000000300)=ANY=[@ANYBLOB="36d600"]) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000080)={0x8, 0x3, 0x7, 0x1, 'syz0\x00', 0x7fff}) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) 07:48:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x2f000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:59 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1d00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3197.543507] hfs: unable to parse mount options [ 3197.619124] hfs: unable to parse mount options 07:48:59 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:48:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x3c}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:48:59 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb0, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:48:59 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x400) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x8000, 0xd0c, 0x0, 0xfff, 0x2}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x62f}, 0x8) [ 3197.836332] hfs: can't find a HFS filesystem on dev loop1 [ 3197.871959] hfs: can't find a HFS filesystem on dev loop1 07:49:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$TIOCEXCL(r1, 0x540c) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f0000000580)=""/4096, 0x1000}, &(0x7f00000001c0), 0x61}, 0x20) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x8, &(0x7f0000000040)=[{0xffff, 0x2ded15f5}, {0x7, 0x7}, {0x1, 0x5}, {0x3, 0x1000}, {0x6db, 0xfff}, {0xffff, 0x6}, {0xffff}, {0x0, 0x5}]}) recvfrom$llc(r1, &(0x7f0000000000)=""/53, 0x35, 0x40, &(0x7f0000000180)={0x1a, 0x0, 0x89d, 0x3, 0x7, 0x8001}, 0x10) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x7) 07:49:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x1000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:00 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe2010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:00 executing program 1: fstat(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = geteuid() syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe61c1bb71da5eb77, &(0x7f0000001540)=[{&(0x7f0000001680)="7b75f4d08437ee71206aa0c8823b5fc5f36b52ab7689944dc6faf703e616368b6c7684a81dd4e97d1f22eceacc552f9e3e3d20b44ac8fd6b3c8a4946c79a5e4c5f878d92b435829b648c23e6602588612f863e74f343c037eebe23c9357499af939a7902bdfa8b11be40bd9ceacfd561262d3fd79c6c50e67dc9fc1ecde41d32f8a46618a6f2b3829ded5fb8aee142431daefb5f7deeb6070eb7c71ff6d7f62016a748c6d560141a4897c600a118d0d696fe900f74617a606d0bc18f94d49742442c900d42bd89bcb763bdc031c0851a5f9e20f9aa79afeda4fcdd5dd3364d9fb35aa261fd0c", 0x0, 0x1}, {&(0x7f0000000340)="630d087e8b62c9f02b8535b5252c8eb3d47e5b9f46d8e4b39348432452b7d986fe68152dcdb0459f27719791444d9b2de84e2d0994b42148c79491436185a371f365d4e77a51dc69e7fb6e4e221b75adb0117a61c4ed9e320c49ba93325254406c0434bbcb9878b11b2eddd6670b4af059dfd264d9778d9f9da6ea08c81b2f1190a48f6924cf3a52cca98a688bb7acfc88bf0b99fbb00a45a16a88538ae56c774ef21607fd20fac643dc46b4c9096782591a034f290af4cbc3105992d72310073537a07ae675bb30da4c365f89c06e66b77b1a93bd20ec423f8279e318a1a4b968d6121d9e3ef87cfbe8", 0x0, 0x997b}, {&(0x7f0000000440)="d8427bb214cea66dc757945439684fa9bc9aeb1aae4624f90526d14ea7e2c6deb0b21d3cd95cb8db4b89d42dc309ced00e8231668782c99267c284ddf6e263caf24108006ef020189abc2f2c0ea22fb0bb6151e3abc5ad6c6bd991ba2a3d53cc3c186cb0a4a38e2a726c2c2b26bfb7cf986d36ba85e33bb610c57d955380a9af9b1daf9f8c4e4877308e854f1ed23db684ee1633ea6ce400cb0246471c1005eecced0f3b4ac9ad557683022b26fe48bab0fbd2420da6139cd1ad07d59b519e9590d53048de41d3d8af6a8d0bba4a898d9efe388cfbfe17b6a15984a1e5cb3af3e832b5bceb0b771d", 0x0, 0x9}, {&(0x7f0000000280)="d294bc5993260042e0366f88d69aceb783b7e5ea2f7d8524b0c93d90045c14112e47553031b923856e8dbd2f8a754f0f976f91fa0034f6ddebf9a63fa2243de157ed2513979c47", 0x0, 0x3}, {&(0x7f0000000540)="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", 0x0, 0x100000001}], 0x0, &(0x7f0000001840)={[{@gid={'gid', 0x3d, r0}}], [{@obj_user={'obj_user', 0x3d, "73656375726974793a246d696d655f74797065766d6e657431db"}}, {@seclabel='seclabel'}, {@smackfsroot={'smackfsroot', 0x3d, 'trusted^vmnet1keyringem0'}}, {@euid_lt={'euid<', r1}}, {@appraise_type='appraise_type=imasig'}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) 07:49:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:49:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x6000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3198.163568] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x11000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:00 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x71000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3198.372402] hfs: can't find a HFS filesystem on dev loop1 07:49:00 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x29000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:00 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) prctl$getreaper(0x19, &(0x7f0000000180)) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f00000000c0)={0x5, 0x1, 0x16, "609a00fcf659fdd3b19388f572fb254d9c95c573ced43be27c213b1a60500e4f4d96bae33119b73392dc1a0227bb7247740789e3f77df29dfdac0d7d", 0x3c, "91551f6f2ac977c0456c575cccd831803583e63699e93376f63cc3649c804d0effedb0bd83fe2cce9c6b8784273766edab62832a03ee646ebc30afe4", 0xd78c0366689e6cb7}) 07:49:00 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8b00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3198.662748] hfs: can't find a HFS filesystem on dev loop1 [ 3198.717896] hfs: can't find a HFS filesystem on dev loop1 07:49:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20000, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000100)={0x2, 'fx'}, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x21}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:01 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x58, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:01 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x40000, 0x0) accept4$unix(r0, 0x0, &(0x7f00000002c0), 0x800) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000100)="02182ca48d36238240a75e832d41eadefb09efc7bc2eb7f740ebbcca54c87442cc76460db1796a9d275c456e9c07eb03abe20ad695cd4bfc92fe59023c8835a35b6d088202b7af734d10243204fe06ba77668fffe86a77e1a491d563df7d496721", 0x61, 0xecb5}, {&(0x7f0000000180)="e8e0e531c17aa44e6740362ffa3f0d943e6d0dd8c28385317bb60d16c0c830288f77fe7a7b857ccccb8b2e714c4941706170d0fcfe01f7c1c2a91372f6c6525dd8bee91dbfbb906e79", 0x49, 0x5}], 0x4000, &(0x7f0000000240)={[{@disable_sparse_no='disable_sparse=no'}]}) 07:49:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:49:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x21000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3199.096133] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3199.096141] hfs: can't find a HFS filesystem on dev loop1 [ 3199.168142] hfs: can't find a HFS filesystem on dev loop1 07:49:01 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1c8, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x2000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:01 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)={0x4, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x0, 0x1, [{{0x2, 0x4e21, @loopback}}]}, 0x110) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:49:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x88ffffff}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:01 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2701, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3199.539172] hfs: can't find a HFS filesystem on dev loop1 [ 3199.629579] hfs: can't find a HFS filesystem on dev loop1 07:49:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0xf43d}, 0xffffffffffffff28) r3 = msgget$private(0x0, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) timer_create(0x1, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f00000003c0)="aa5101eceafb2be3d1440a57decd3f287700a9e51101aa68bf8968e8460df2831f56e611d5dc2d2788f0983a146a571ba0207b639dbcfc8caa39633f8bda6ba0b051150b16527af87360695ec6e6562afedfb7c8242e651e32cf8b73b3bce054963daf4c2d3fb79561dccdbef1c598446887a3fe5d474eeae96c7a9464bf477ea557b431e3f8c5d2e043e43c7f91ab53c0ac78d028d1fe", &(0x7f0000000480)="6e2140445e1e87b8eb3915144843e689d5dad3b000d656aafdeb6c2786bb2fa0682bec8f3871b51a4ecb64fec8de181472eee49217a8d3bac838f6eec46c20fbec708bd8a480611de6"}}, &(0x7f0000000580)=0x0) timer_settime(r5, 0x0, &(0x7f00000005c0)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000600)) getgroups(0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0xee01]) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000280)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) fcntl$getownex(r2, 0x10, &(0x7f00000002c0)={0x0, 0x0}) r10 = fcntl$getown(r1, 0x9) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000300)={{0x82c, r4, r6, r7, r8, 0x0, 0x413}, 0x8, 0x248800, 0x100000000, 0x3b, 0x8, 0x0, r9, r10}) listen(r2, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x800, 0x40) lremovexattr(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)=@known='trusted.overlay.redirect\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r11, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r11, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x3c000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:01 executing program 1: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) gettid() syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7479705ac83fb1e648df8d"]) r1 = getpid() r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x30000, 0x0) bind$unix(r2, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x80080, 0x0) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f0000000200)={0xffff, 0x1, 0xffffffffffff5a98}) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x7, 0x9, 0x0, 0x1000000000, 0x0, 0x4, 0x8000, 0x4, 0xabc, 0x3, 0x9, 0x8, 0x3, 0x4, 0x2, 0x7, 0x7, 0x8, 0x3f, 0x9b9c, 0x2, 0x57, 0x8, 0x3, 0x4000000009, 0x53f6, 0x4a7c, 0x600b8eab, 0x4, 0x3, 0x8001, 0xc000000000000000, 0xfb, 0x6, 0x63c4f4cc, 0x8, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0x9, 0x1e}, 0x1000, 0x70, 0x3, 0x8, 0x8, 0x401, 0x1}, r1, 0xf, r2, 0x2) 07:49:01 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3b, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3199.936227] hfs: unable to parse mount options 07:49:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:49:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x3a}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:02 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xfa, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockname(r2, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000040)=0x80) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="020000bb57ae0a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) fanotify_init(0x47, 0x40000) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3200.172300] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:02 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xffffffff, 0x42080) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000140)={0x2, 0x7, 0x0, [{0x6, 0x0, 0x80000001, 0x1ff, 0x0, 0x3, 0x7f}, {0x100000000, 0x9, 0x101, 0x0, 0x7, 0x0, 0x4}, {0x4, 0x9, 0x100000001, 0x10000, 0xfffffffffffffffe, 0x0, 0x7f}, {0x9, 0x1000, 0x6, 0x9, 0x8, 0x40, 0x200}, {0x4, 0x2, 0x8001, 0x10000, 0x7ff, 0x4, 0x81}, {0x1, 0x5, 0x8, 0xfff, 0xf5f, 0x3, 0x100}, {0x0, 0x1000, 0xfff, 0x10001, 0x6, 0x0, 0x40}]}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="74f2a768000000000000000024f92c00b8bff9fb48904e529cf62e8f3a4808151524410164951f6bf3b43d917acb0200000000000000b1a9715754cfd06824943a3483bf5bfaa079f83f53a6de86ba9a0566f475e49690d38f3db10fe2ee8534ef018aacc0e9163fb3fe3c5f"]) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000380)={0x3, &(0x7f0000000340)=[{0x7, 0x6}, {0x44a5, 0x7ff}, {0x4be, 0x7}]}) 07:49:02 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x2c}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:02 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1e010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x84ffffff}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3200.481789] hfs: unable to parse mount options 07:49:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x2f}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:02 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3c000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3200.563086] hfs: unable to parse mount options 07:49:02 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)) [ 3200.720370] hfs: can't find a HFS filesystem on dev loop1 [ 3200.775720] hfs: can't find a HFS filesystem on dev loop1 07:49:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x2}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:03 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x36000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:03 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x8, 0x10c02) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x81, 0x5, 0x1}) 07:49:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:49:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x24000000, &(0x7f0000000100)={0xa, 0x4e21, 0x101, @empty, 0x1}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3201.083340] hfs: can't find a HFS filesystem on dev loop1 [ 3201.084326] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3201.138239] hfs: can't find a HFS filesystem on dev loop1 07:49:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x11}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:03 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x99000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:03 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:03 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="747970653d29131c87c795a9314c6c3374b8f57b0732fb46c2e23ab10dc57e049ef975981489fcef81b5a3e8"]) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x30000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x1, 0x0) faccessat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000) 07:49:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x543, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3201.355820] hfs: type requires a 4 character value [ 3201.375067] hfs: unable to parse mount options 07:49:03 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xbf00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3201.458823] hfs: type requires a 4 character value [ 3201.463804] hfs: unable to parse mount options 07:49:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x28000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:03 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@quiet='quiet'}]}) 07:49:03 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5001000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x4000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3201.801166] hfs: can't find a HFS filesystem on dev loop1 [ 3201.862937] hfs: can't find a HFS filesystem on dev loop1 07:49:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:49:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x7, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:49:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0xf, &(0x7f0000000100)="1dff96c4750b08e2ee60b44d34616ee4c631d3aa155232211b28524b2374e3eaafbb3f36577e40c29c77730c2c9c3eead199b10901d17e52dd51b0a8b929ad9936e95ee3d75cc3c0920f9cc41bfce0bd0092289a918c98ea19b4cb60bcc5e47f55ca8d11357dd5f8b0277c36434abf51e6c3a1c3f73cea", 0x77) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000180)) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) [ 3202.078666] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3202.133756] hfs: can't find a HFS filesystem on dev loop1 07:49:04 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcff]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:04 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8201000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x60, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3202.204518] hfs: can't find a HFS filesystem on dev loop1 07:49:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x180) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000000c0)={0x1, 0x0, @ioapic={0x6001, 0x2, 0x7f, 0x5, 0x0, [{0x8, 0x1, 0xe0d, [], 0x80000000}, {0x2a63800000, 0x6, 0x3, [], 0x7fff}, {0x1, 0x6, 0x8, [], 0x2}, {0x5, 0x1, 0x8, [], 0x4}, {0x9, 0x10000000000000, 0x7fffffff, [], 0x20}, {0x1, 0x4, 0x3ff, [], 0xfe02}, {0x8000, 0xfffffffffffffc01, 0xcb5, [], 0x3}, {0x20000000000, 0x2, 0x1}, {0x7, 0x6, 0x5, [], 0x9}, {0x3, 0xffff, 0x1, [], 0x2}, {0x2, 0x80000001, 0x3, [], 0x1}, {0x10000, 0x8, 0x3, [], 0x5}, {0x0, 0x100000000, 0x1, [], 0x10000}, {0x44f, 0x3, 0x80, [], 0x7}, {0x4, 0x8, 0x4, [], 0x200}, {0x9, 0x9, 0x0, [], 0x32a}, {0x3ff, 0x20, 0xffffffffffff63b6, [], 0xfffffffffffffe16}, {0x49b, 0x1514, 0xf66, [], 0x1}, {0x1, 0x8, 0x8, [], 0x401}, {0x0, 0xae, 0x5, [], 0x8}, {0x6, 0x100000001}, {0x8, 0x0, 0x400, [], 0x4}, {0xfffffffffffffffd, 0x7fff, 0x8, [], 0x1000}, {0xfff, 0x7, 0x7, [], 0x6e57}]}}) 07:49:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x88caffff00000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:04 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc7000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3202.434083] hfs: can't find a HFS filesystem on dev loop1 07:49:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x6000000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3202.481700] hfs: can't find a HFS filesystem on dev loop1 07:49:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000015c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001600)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, 0xffffffffffffffff) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f00000000c0)='./file0\x00', 0x7fff, 0x7, &(0x7f0000001400)=[{&(0x7f0000000100)="12a59fe0a58add86cd11f6aa0ca4196179dbaa87aa597d48680bd0da350c3377d4851f8884d6c47220a59148fac2ab5c7ef2742fb7cb1ea7ce2047542b3bf0817f955d66", 0x44, 0x1d92}, {&(0x7f0000000180)="e44962b5e98c427b9f97794b6ef4c015da27a9211b7a4ae82c824f4d271700a5e19e6287b662b1a1fd167b40b35a2aeab41b7419f8c8c9c44c9fdfa4266869f53fa15d1eea3e8ce3400339b630a657178876403fc7435855a9f4c4b49ff4c6079f443e30674c0863107a6e194b5a278a6debb5", 0x73}, {&(0x7f0000000200)="b61308f133c63995de849c10c720289763c4d7aea4fcce69e5607e4d2356369b71672e987de2835058906c02e0fdda4dbbdb5a1cf2feb9622f088fa54d9ba051e68684a4953eaa15f09434ca762eab3c6600b67bcdc567bdefaa559c749d078da6b425dc7c589e0cfb9d998382002572b015b78dd4665afa42c52bea07a491", 0x7f, 0x3}, {&(0x7f0000000280)="240fc48d6c841cc2ecced2dbfd3b84cb2e450e00f323dee9397a81fa0692f180cd631c4122dc008812e42d47a9904c8656d8e49629642fb0cccc8689d5ea3272fb371aa3252fc112c5", 0x49, 0x532f}, {&(0x7f0000000340)="0a72376b52bdac015b033a4e2616af8ef4ce0f0c520754532f960862dc270114ac6cfe1d08cda1b7462331bcf02d2b15cbf17061194f71fd46a50620330be66a5a255dab28abe0b10fc0525dbd04b914695e80be5ec9ef9abb5edc6d98bc1a914a7bb0297c13e46eea349f2e45f84d9b33e1f9aa1015d50bb0609827235635c9", 0x80, 0xffff}, {&(0x7f00000003c0)="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", 0x1000, 0x3}, {&(0x7f00000013c0)="aebd0083cae6f8fd5939995af45895429de0de74226db52a5f1907fca9057b9640d930069ff0df18abddb58c4d770b8521d824f3b81dd24361", 0x39, 0x1}], 0x20, &(0x7f0000001700)={[{@fault_injection={'fault_injection', 0x3d, 0xfff}}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '%%vmnet0'}}, {@obj_user={'obj_user', 0x3d, '(wlan1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '{securitysecurityvmnet0wlan1[eth1'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r0}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, 'type'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffff7f}}]}) [ 3202.670401] hfs: can't find a HFS filesystem on dev loop1 07:49:04 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xfc01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x14000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:04 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x2a1, 0x10100) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000000c0)) sendfile(r0, r0, &(0x7f0000000180), 0x100000000) 07:49:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 3202.972169] hfs: can't find a HFS filesystem on dev loop1 [ 3203.043620] hfs: can't find a HFS filesystem on dev loop1 07:49:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x88480000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18, 0xffffffffffffffda, 0x6, {0x7}}, 0x18) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:05 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xeb000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:05 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:05 executing program 1: set_mempolicy(0x1, &(0x7f00000002c0)=0x9, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000340)={[{@session={'session', 0x3d, 0x2}}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)=0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x400, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f00000001c0)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x2001, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x6, 0xffffffff80000000, 0x32, 0x8000, 0x0, 0xfffffffffffffff7, 0x22000, 0x8, 0x800, 0x4, 0xffff, 0x401, 0x8001, 0x5, 0x4, 0x100000000, 0x10000, 0x5, 0x7, 0x8, 0x4, 0x3f, 0x6, 0x7, 0x2, 0x3bb, 0x100, 0xffa, 0x200, 0x1, 0x20, 0xa4, 0x40, 0x4b3e, 0x5f, 0x100000000, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0xffffffffffff7fff}, 0x24, 0x80000001, 0x1000, 0x5, 0x1, 0xb5}, r0, 0x2, r2, 0x2) ioctl$KDMKTONE(r2, 0x4b30, 0x100000000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x8, 0x2, [0x6, 0xfe4a]}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000280)={r3, 0xffffffffffff0194}, 0x8) [ 3203.239308] hfs: invalid session number or type of track [ 3203.243250] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3203.254264] hfs: can't find a HFS filesystem on dev loop1 07:49:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x800e, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:05 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc301, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:05 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) 07:49:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xb, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3203.442527] hfs: can't find a HFS filesystem on dev loop1 07:49:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x806000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3203.504279] hfs: can't find a HFS filesystem on dev loop1 07:49:05 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5501, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10}, 0x10) 07:49:05 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80002, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="74a610000065dd24f92d00"]) [ 3203.822756] hfs: unable to parse mount options [ 3203.892180] hfs: unable to parse mount options 07:49:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='attr/sockcreate\x00') getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000240)=0x7, &(0x7f0000000280)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f00000001c0)) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000000180)={0x1, &(0x7f0000000040)=""/28, &(0x7f0000000140)=[{0x6, 0x31, 0x4, &(0x7f0000000100)=""/49}]}) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x4000000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:06 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1d2, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:06 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x4, 0xfffffffffffffff8}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0x9}, &(0x7f0000000200)=0x8) 07:49:06 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xd000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3204.093789] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x2000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3204.192523] hfs: can't find a HFS filesystem on dev loop1 07:49:06 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6e00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3204.292581] hfs: can't find a HFS filesystem on dev loop1 07:49:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xd00, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:06 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="747970653d65dd06f92c00"]) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) [ 3204.491293] hfs: can't find a HFS filesystem on dev loop1 [ 3204.555790] hfs: can't find a HFS filesystem on dev loop1 07:49:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x100000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:06 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4d01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x4, 0xfffffffffffffff8, 0x769}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)="c86262820c8cbbd8a3612e8b3565a82fa0a0b6aad1f671fc452719c775fffff5c06c50efcc809575853b3331e8ed580656ec50cb4a3ab0964e8859d77724671a59280beb7b95", 0x3f) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10}, 0x10) 07:49:06 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7479705487831d4d0a636b8214a095c7bfa760138a27b048d3d0808816f2b6e5a05838818280f6262d7e1ee3546b91d1ee8c701ecd9b101d61685417e8ec3f4cab45b17cb105b61645a69e3f7c2f6dcf358710ade62eb02699d30ecd66c6aa50c3cf693083fe98e424be61a7efd0e23065bc9ec89f1449b413ddc2"]) 07:49:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x806, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3204.950925] hfs: unable to parse mount options 07:49:07 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3901000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:07 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xd, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3204.986482] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3205.007428] hfs: unable to parse mount options 07:49:07 executing program 1: socketpair(0x7, 0x80000, 0x84, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open$dir(&(0x7f0000000100)='./file0/file0\x00', 0x4000, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0/file0\x00') syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x139, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="747970653d65fb0d996c99"]) 07:49:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x4788, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:07 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xdf01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3205.255971] hfs: type requires a 4 character value [ 3205.272642] hfs: unable to parse mount options 07:49:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x88a8ffff00000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:07 executing program 1: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="dfad9137c7971e18c51065c76468535ab56d8b8281ef41f595a6179e4219b5b5f2647a9722702d10c1a0551e", 0x2c, 0xfffffffffffffff8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, r0, r1, r2) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) [ 3205.443721] hfs: can't find a HFS filesystem on dev loop1 [ 3205.507978] hfs: can't find a HFS filesystem on dev loop1 07:49:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3800000000000000) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='westwood\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r6 = dup2(r4, r5) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r7, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) getcwd(&(0x7f00000003c0)=""/157, 0xffffffffffffff79) 07:49:07 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe901, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x800000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:07 executing program 1: r0 = creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000001680), &(0x7f00000016c0)=0x4) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x400000000, &(0x7f00000015c0)=ANY=[@ANYBLOB="0000000000000000000000ae9dda603879c280ba25ae6b5b0b2a1a305642fd5163df41a624fff7b56f270b012a5eca397cf746c6f55852cc82fd071b746acfd08869616ac883cd57f58fb5b6caec50e1115ee301bfdb2f3d910c567a52a9e1192fad7d4a5b210d9e20d0321ac389e5a7bff0a00d7204e3f6f94b1911b3290a60fe1b0155a66e90e832fad50a5f5cbcb32639049565d85f2fb0d5dcc14b8c56f3b8fc2c0784fd2fdb8fcd99cab5d830855fb7d6392c067bc79f41401eb7e5"]) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfff, 0x7, &(0x7f0000001480)=[{&(0x7f0000000100)="896307a4bd7c4b92d34c4d569665f230a1b08b317d42165f1f217c1cd8958b8b4a405f4ffdd504fd9538", 0x2a, 0x9}, {&(0x7f0000000140)="2fde53d70f2d2197054062363628af62bc4576ffe9425581c6c58024ed2e5241b91822cff6d0d37824a4a092959d73daa3d3af73163e9af2a8e3323d2d5405ad9fb2c38bc44c088fe9f7e5eaa458a4a0731854940f16b0dd6416a9c858d3aec334f82628a0d6b4aca69fdd18c3a53acf860614faf796d7d059f7eccc5adcf1359bd1fcc08a1a3e646b8c4ee3ca47d8b8fe222199c25ab5a3f15a26dfdbdec87ed7464ce23ded1f6a493cb9ffc6a769ed4d411ac03a1ab92cbba2ff0850892c11c2737eaec4380ab95e801bffc2b6e19adc9ef96fe4fc81aa228bb527fe77ab8df5e5", 0xe2, 0x3}, {&(0x7f0000000240)="69e016f5d2feebedcbcd4d7be3147401321cb2a05433ec5dcb86ff46a8d57e1e4f29028a340bb964b15f4afd3dac3f7b5aacf30824b51f8089e0871d4babaa99afb2c070997304be6a1ed9e53b7671b7a0d40e62cb25848789016099af12a8c00faadc8db0a0c3716f1cf30ec3e4edb3a7588dd9753ad50630b61c33236065f042d9dbd61b7b9e75308622353a424e23f40c0cd8b1", 0x95, 0x10000}, {&(0x7f0000000340)="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", 0x1000, 0x9}, {&(0x7f0000001340)="cdd25221983519d9fe09b0485c2098cb56a158b5114b45761ea4280aed0ef77e728a6d83a4ecac00647bba0f", 0x2c, 0xaef}, {&(0x7f0000001380)="fe4091e50e7929088e2250dbecee6413dfe1981890080ad9309c31d1caab1bc0d13c681df6f539e56f814d328bd82b2ef218a13e6698efbcf07a4017ebf22022b75f6c83e6", 0x45, 0x7fff}, {&(0x7f0000001400)="f83b529a4f61edb9c8d4229ab8def54c368a7c048da3524b30ed2f829ed7709127eb9293254525dd22d269a19a3ffea7968733bc36b5d195c2b869393d6e658d65c622abda6454524bc459e639fce7987f94b6ca1fd96c926e43d51a218ccd922eb9ef", 0x63, 0x6}], 0xb, &(0x7f0000001540)={[{@part={'part', 0x3d, 0x6}}, {@part={'part', 0x3d, 0x33}}, {@session={'session'}}], [{@seclabel='seclabel'}]}) 07:49:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10}, 0x10) [ 3205.910540] hfs: unable to parse mount options 07:49:07 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x2800000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:08 executing program 3: socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x9, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) lsetxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:var_spool_t:s0\x00', 0x21, 0x1) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000040)=0x44) listen(r3, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f00000003c0)={0x2, 0x0, [{}, {}]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x5}, &(0x7f0000000200)=0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='yeah\x00', r2}, 0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r5, 0x100000001, 0x9}, 0x8) 07:49:08 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000300)=""/158) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00002c00000000000798caa6697623bdf4b88a128f11db211cf7074f4a685e2a712bca8cad4f789402db272ac217ed446b14769ab8c0a4d9e3ce539bcb67a6ab872fa10cc7668d2a7991d15073fccbc76cb5ad06dfac43cc178c54893ba11461d2a6f8faabd63f8378678b45f28052c3c04a6461d00d524359c0c82255246dd92d836f1af32d92367ea6e12ac5c377f074"]) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x2, 0x80) accept4$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c, 0x800) ioctl(r1, 0x80000001, &(0x7f0000000140)="033a3168581517002ef9e78c08ee44c612dc9abad5e7e1b41103139b8ed4c823081b4999e73efac44f") 07:49:08 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc2, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x60000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3206.103574] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x88470000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3206.179968] hfs: can't find a HFS filesystem on dev loop1 07:49:08 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x69, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3206.269201] hfs: can't find a HFS filesystem on dev loop1 07:49:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x3c000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:08 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7479040000008ac430bf3d65dd24f9"]) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x9db, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1, 0x2}, 0x8) 07:49:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x689, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3206.455914] hfs: unable to parse mount options [ 3206.513173] hfs: unable to parse mount options 07:49:08 executing program 1: lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x370, &(0x7f00000005c0)=[{&(0x7f0000000100)="b11943403646d55f7b2e7653a898dfd19537753e155e52603012e223f1ec0609746c5959e2aacd44b6be7060cf4eb40ecdb96ef3a8c99714d7869a24a5051370522dc7e3944a4c73d485033b1ad687ef638db6411cdb0113e717b2912acb6a95f7ee764a63a6d47e01460f2e5f7c8ff14ae9d0a9d04358563e9c59e4001d", 0x7e, 0x7}, {&(0x7f0000000680)="f11f4ff825d46e1317430ea0fd1f1c7acb7c2ef8fed781b4fcb0b7274373ac6095bd293feb1d1838a7cfcb7c86716b0cbdf8b00e2c8203435d07018ed18192778e51a8143f02dabec9ff98e0f4125c23453633fccd1e060de449a7c0fd59ef1df270e6a5e48e87840cd20bb5c126d4d4decccc70f89b637a79684c00303f2072684b8ef7b99724b3fdf1aee5e3608476dc3f2771436bb1917aae25a9fb22daee643c512f6f7e997ed6ef4f2f5fa86701e2988102b52c0e4f0dd3aa7a02bd209a86504d36a3a27639e35871556e98229360269e48f45bfbcbb0f29ebf1e9a32f30242e1fe3e99181030a8d489311f4a8789900559aabd", 0xf6, 0x100}, {&(0x7f0000000280)="3d1ca5d6eb6b3f74434105cb1480", 0xe, 0xffff}, {&(0x7f0000000040)="4a4d0cfb68a17eafb45ff2c372c52804388150e83f42a2387a0733f6c4f78d36922f77d800c924f0e95f9fef7cd7ebdda16300aa2587ccc505", 0x39, 0x9}, {&(0x7f0000000340)="346cf570911abd9130d93680c7c30b7850f3bc5cc44d802541d2fa6fa823eec41fe2e1945ad46e83694db198059e33f8680c0008000000000000f8a7567164586525b6db44461b19d89082fdb5218332804800b0d0db810d6d4d899d84918cdd1bcc60a972109cadbfbeec7b0eadb63997dc0aaa356857626bd319a5c2ef", 0x7e}, {&(0x7f00000003c0)="fd9cb18bb46e820e8e9df2f18d3acd61e768dcd47dec9323142504f02ba022849d012e6bdbec8e3e48006529f87243136c6858db32282215a240fb907053e5956eccaea8cb56c68a3644bd5420d4fc5ff657c0cc906005aa8a78b92f03ece5e02eb8ed9b20dbb2f80b06bc960ebe6822ea99cec02cb7f52e1930d0debf7fc38fd5991a7281b8e704efe6dd53a2800db39fbbbab04d5302fdf5bc094fd1a7b80c7c74c498ee32902dd163dae2381b88642650f4f5d55a6e91b5ac5f7a6c509b96dbce1fa2767186f9ff86a35a40e480dadd260f2b34b3c734e81d50508656e4fa779c7e665c6b7c0d6b3790", 0xeb}, {&(0x7f00000004c0)="5dd49392ca47db1eaed4fb578412816988a28c4681f051e79803ee784de699e27f12102b4bc13500e05ea21eb57b869164ffae6c51cf7544948289aa7711d3cd61d6d2ddcf26bf4ab69137488016bde76a16fccdaf7362d9e49d07a9363e07c43a47cb5eb7ed297e381850ec85eefdb5765afe8362488b89b75348131d8eb5b7ea0de6a86542fd64b17acb547162881d0260cf6ad49b04049c105302c0c95ae91a24c63769278629302b5f9ee9ae324f6f19a210c6c825faf48a9fbae6faafb4efcbcce4f788", 0xc6, 0x3f}], 0x0, &(0x7f0000000800)={[{@uid={'uid', 0x3d, r0}}]}) [ 3206.709476] hfs: can't find a HFS filesystem on dev loop1 07:49:08 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:08 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7400000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) connect$unix(r1, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 07:49:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xd00000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:08 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="020200000e000000000000000000000005000600000000000a000000000000000000000000000000000000000000000000000000000000000200010000000000000000020000000005000500000000000a000000000000001e1700000000000000000400000000170000000000000000d4722ebd25160c7445110a58dea88165a59a2e88c20d0193368a53ef7ab9f9f775c689f382f0cf07ccc0380082397418a18518023ab12560870a572f6d9785339b66c5de75f5af2909de1bf26e6ec755d71526e192c5b9e61deae72f5fe4205bf6ff366af95e"], 0xd6}}, 0x0) 07:49:08 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:49:08 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xba010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x1400000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3207.011522] hfs: can't find a HFS filesystem on dev loop1 [ 3207.048070] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 3207.086701] hfs: can't find a HFS filesystem on dev loop1 07:49:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x300, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:09 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8a010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:09 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="747970eb3665dd24f92c00"]) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x1, 0x90000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x6d, 0xe8, 0x80000000}, &(0x7f0000000280)=0x10) r2 = socket$alg(0x26, 0x5, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000140)) sendmmsg$inet_sctp(r0, &(0x7f00000005c0)=[{&(0x7f0000000100)=@in6={0xa, 0x4e21, 0x5ef6, @empty, 0x3}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000140)}, {&(0x7f0000000180)="51005bfddf06f21b007aa8ba5140df29f876859a14b39c4f0fa77edc028f779f05c7c13306ea57d7670c8af2f0764d720d423ea64abd7c13559a805f015b8fd15d915d641556531ea43d65b36f4748b03febc5ef96a63f35cc84f1f9e404d5118f6fd59bd292dff70506f4bd4d15db4df30bae200c928044c3f3212d9b", 0x7d}], 0x2, &(0x7f0000000340)=[@sndrcv={0x30, 0x84, 0x1, {0x5, 0x0, 0x8000, 0x7, 0x8, 0xe59, 0x8000, 0x2, r1}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @authinfo={0x18}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x5}}], 0x80, 0x40810}, {&(0x7f00000002c0)=@in6={0xa, 0x4e20, 0xddac, @ipv4={[], [], @broadcast}, 0xbe}, 0x1c, &(0x7f0000000540)=[{&(0x7f00000003c0)="65e250c19d9cb699779ff3d0515c44337aec1ea55cce3e854afa957d4d1a84dcf146daf732720c931450cc9ea936b80cc0da6740f16b5939", 0x38}, {&(0x7f0000000400)="edb8a6d1e026f7f5135dc51003080133d7a1d98d03a8e52b8c3f0000000c9765c56dc1b4", 0x24}, {&(0x7f0000000440)="6a3cd350fad2c09f4b950b01b07c79b4edfade6ba08b2624e8cd348cc9dd3a3be1639ec90a81d282ad6662dd1e0496df193408553d18d53c0810fa42a43de78129f8d9c6eb9a74c8030bcd5a2630a6548b71220c395f939a9e7eb7db4b4af6119a2248df681be456a29e775d1421a5e68bd2a88d5bdecde3e1d06a5f6ffb6d540bc793d965d39a9666fd6d6283517cbd701a64f737aaf32aec14117d438f46799eda8c90a86f5493451a73269792d7b7b1f36a8a984bcd525844c007aab17904088e6bb0eb8bf3a2d41e7195ab2b545ed754da26dca44ea4", 0xd8}], 0x3, &(0x7f0000000580), 0x0, 0x4}], 0x2, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x2) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x101, 0x7, 0x7, 0x98200000000000, 0x6, 0x1000, 0x8001, 0xfffffffffffffcca, 0x9, 0xe739, 0x401, 0x5}) [ 3207.310934] hfs: unable to parse mount options [ 3207.370499] hfs: unable to parse mount options 07:49:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x3c00000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:09 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd001, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:09 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x4f, &(0x7f0000000180), 0x0, &(0x7f0000000180)={[{@type={'type', 0x3d, "65dd24f9"}}], [{@obj_role={'obj_role', 0x3d, 'type'}}, {@obj_role={'obj_role', 0x3d, 'hfs\x00'}}, {@subj_user={'subj_user', 0x3d, 'type'}}, {@uid_gt={'uid>', r0}}, {@smackfsroot={'smackfsroot', 0x3d, 'type'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'hfs\x00'}}]}) 07:49:09 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8060000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sync_file_range(r0, 0xfffffffffffffff9, 0x5, 0x6) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:09 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1c6, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xffffca88, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3207.986709] hfs: type requires a 4 character value [ 3208.000452] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3208.037849] hfs: unable to parse mount options 07:49:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) shutdown(r0, 0x1) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000002, 0x93) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='veth0\x00', 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000080), 0x4) 07:49:12 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3801000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xf0ffff, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:12 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000180), 0x100, &(0x7f0000000840)=ANY=[@ANYBLOB="700072743d3078303030303030303030303030303031662c00256f5747df4aa9495adc364fd7c11d0d8db8836b576b75068cf88bc04d49f065e0abfdb4a2b6c74780fcf89248e16b2ab9ff1752c1cd3fb7d6b59fa9bffc9c69f1c1fd9c53619e41f440032541e72eb0c6dd01c8825a047cc72d9cac329d2ccefe6e41262f0a876ee208ab50387c32abe3914e3fd8210b83e0cdd175873a148bda4e77248ba9ae649ae0d25c0e665f10f9e1b5ba00c83a1d4f55d3a65cde11b3056bf65c24da35cad1467175"]) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x404900) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000000c0)={0x1ff, 0x8000, 0x5, 0x4, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e20, 0xffe0000, @empty, 0x1ff}}, [0x0, 0x1, 0xfffffffffffffc01, 0x1, 0x5, 0x5, 0xff, 0x9, 0x401, 0x8, 0x8, 0x1, 0x0, 0x1, 0x5]}, &(0x7f0000000240)=0x100) r2 = creat(&(0x7f0000000780)='./file0/file0\x00', 0x40) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000007c0), &(0x7f0000000800)=0x4) socket$inet6_udplite(0xa, 0x2, 0x88) 07:49:12 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000001c0)) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000040)=""/34) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000140)={0x2, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e23}, {0x2, 0x4e22, @local}, 0x1, 0x4, 0x2d25ca0c, 0x9, 0x43a, &(0x7f0000000100)='syzkaller1\x00', 0x80000001, 0x0, 0xff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x1400, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3210.299185] hfs: unable to parse mount options [ 3210.309261] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x80350000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes-fixed-time)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e3139d225c54dbb7c05809", 0x10) r2 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}]}, 0x7ffff000}}, 0x0) [ 3210.413501] hfs: unable to parse mount options 07:49:12 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@quiet='quiet'}]}) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7f, 0x98000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x8, @time, 0x1, {0x7, 0xfffffffffffffff7}, 0x0, 0x2, 0xff}) 07:49:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x4888, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:12 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd6010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xffffa888, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3210.653765] hfs: can't find a HFS filesystem on dev loop1 07:49:12 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0xa00005, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001ff) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) [ 3210.746597] hfs: can't find a HFS filesystem on dev loop1 07:49:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8848000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:12 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf0010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3210.808557] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3210.835548] MINIX-fs warning: remounting unchecked fs, running fsck is recommended [ 3211.005756] minix_free_inode: bit 1 already cleared 07:49:13 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:13 executing program 3: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:13 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x4102, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:49:13 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0xa00005, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001ff) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8100000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:13 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1a0, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xf0ffffffffffff, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3211.204607] hfs: can't find a HFS filesystem on dev loop1 [ 3211.253252] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3211.280190] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3211.296230] hfs: can't find a HFS filesystem on dev loop1 [ 3211.315082] MINIX-fs warning: remounting unchecked fs, running fsck is recommended 07:49:13 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0xa00005, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001ff) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8864, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:13 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1c4, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:13 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 3211.435214] minix_free_inode: bit 1 already cleared 07:49:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x86ddffff00000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3211.524609] hfs: can't find a HFS filesystem on dev loop1 [ 3211.617293] hfs: can't find a HFS filesystem on dev loop1 [ 3211.624543] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3211.795131] minix_free_inode: bit 1 already cleared 07:49:13 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:14 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x8, 0x400) fsetxattr$security_smack_entry(r0, &(0x7f0000000240)='security.SMACK64IPOUT\x00', &(0x7f0000000200)='\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x3000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:14 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb900000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:14 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0xa00005, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001ff) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:14 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) [ 3212.177976] hfs: can't find a HFS filesystem on dev loop1 [ 3212.195789] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3212.198514] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xffffffffa0008000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3212.224062] MINIX-fs warning: remounting unchecked fs, running fsck is recommended 07:49:14 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0xa00005, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:14 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf000000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3212.284048] hfs: can't find a HFS filesystem on dev loop1 07:49:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x6, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3212.366069] minix_free_inode: bit 1 already cleared 07:49:14 executing program 1: r0 = getgid() syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x7, &(0x7f0000002340)=[{&(0x7f0000000100)="1ea444f26846d63f9473c1b5f3ff31c43760adfb4f987a9124b1a0cb72a7267c29290580c919e213f5402af564030a9deb0b1820e2364f0cef388e974aca0d795be4e0b66646be0b675223162b66a64b9f3b925e864cd327d7bc5d1cedcae8bd1d627072ff68985b1bd6e047e0d1359a8cde0b03da04a6637341", 0x7a, 0xe}, {&(0x7f0000000180)="2ddf062310927eff60f15af57a68104e0b8ce9bcf5a6e85f0e9d20f8533f1e4f1f6ba5120429ded67bef64b5", 0x2c, 0x1}, {&(0x7f0000000340)="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", 0x1000, 0x2}, {&(0x7f00000001c0)="0a945c08479c88957925188058410e1520", 0x11, 0xb629}, {&(0x7f0000000200)="c276d696b2a2", 0x6, 0x4b7}, {&(0x7f0000000240)="8c9b705883c5483d384972964aad9cc7b8dac7a59718a4ccf88761022ff67489ee738d4002003a35e719ac0d883c2b561ef68d6672b57970bd275cb1e49fa5706c1f2f9294e69f4cacbbba989c34d8a6a36144dea77ec4f9385b5d28033131", 0x5f, 0x9}, {&(0x7f0000001340)="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", 0x1000}], 0x200800, &(0x7f0000002400)={[{@gid={'gid', 0x3d, r0}}], [{@appraise='appraise'}, {@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:49:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xe0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3212.542684] hfs: unable to parse mount options [ 3212.559390] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3212.598303] MINIX-fs warning: remounting unchecked fs, running fsck is recommended [ 3212.621561] hfs: can't find a HFS filesystem on dev loop1 [ 3212.716720] minix_free_inode: bit 1 already cleared 07:49:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x3e8, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x5, 0xc0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f00000002c0)) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000180), 0x4) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x19a000000, 0xfff, 0x10001, 0x40, 0x6}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r3, 0x100000000}, &(0x7f0000000280)=0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000140)="f634085a9a0ebb407f77e4b2f650348f0d94a9fd0b15a4c6d7f5be6ad498dba6cb24c93f6265af53e88e06957a233aae0bc0", 0x32) sendto$inet6(r5, &(0x7f0000000300), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e1f, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}, 0x33ec}, 0xfffffe89) 07:49:15 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xac00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:15 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:15 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="747970653d83dd24f92c00"]) 07:49:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xfffff000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8000a0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3213.042781] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3213.052457] hfs: can't find a HFS filesystem on dev loop1 [ 3213.077843] MINIX-fs warning: remounting unchecked fs, running fsck is recommended 07:49:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(r0, &(0x7f0000000580)="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", 0x1000) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:15 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x9101000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3213.161455] hfs: can't find a HFS filesystem on dev loop1 07:49:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3213.235409] minix_free_inode: bit 1 already cleared 07:49:15 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6c3b7279298a9a40cd6b7f76a8669b2aa41687106dad0dd4f4d2ba6abe02384f6308576c"]) [ 3213.302579] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:15 executing program 4: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x600, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3213.431171] hfs: unable to parse mount options [ 3213.518920] hfs: unable to parse mount options 07:49:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8000a0ffffffff, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3213.542218] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3213.613651] minix_free_inode: bit 1 already cleared 07:49:15 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:15 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000000c0)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:49:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xea00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:15 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) [ 3213.913659] hfs: can't find a HFS filesystem on dev loop1 [ 3213.918428] MINIX-fs: bad superblock or unable to read bitmaps [ 3213.993049] hfs: can't find a HFS filesystem on dev loop1 07:49:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x7f, 0x2) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f00000002c0)) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x10000000000000, 0x20000) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000200)=""/99) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, &(0x7f00000003c0)="0bc3896c6f4734ee1b404cc3622ed679a404bc372068d5b1a1b3981937c0867e685a8b60a7ebef36b1ae2fc0c2d428f227a7930aee451861ced6d1edfe9b27e5058ab1a6a5d4100fe33dba58f9373cc119fdfcbe6eb2b98f6e0f353f9489756ef21c6392b3f8fbbf49a9f8981d07a99323515ac361c94a36910ff3499382c7b1ab3165d1cf5fd0a87f0fd38be38dbc80020f1b49c643a79a838f0c1d8add170480d5d3bf5d433d330a3f6a89fb24d2275ef4fd0141a5e211d81a8550331bd5d74ac8f0cc138a6f7c400797e52d9b7ecd9b588d991c82fe22246926d1b6add65d", &(0x7f0000000580)=""/4096}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) uname(&(0x7f0000000100)=""/207) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) connect$pptp(r1, &(0x7f0000000340)={0x18, 0x2, {0x2, @local}}, 0x1e) 07:49:16 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf601, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xf401000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:16 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000000240), 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:16 executing program 1: r0 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) r2 = getuid() syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="9ebce51ce83e659609c8c36b31b7941253b52130649721b70d468c4c67ad469ff26c2ee531da3c61b65b9fa5180c64354e3bae91d9899f1d8ef834ed0e4a782e8889e51d540cd6e32a045c2df3803a5b89b7c1fbdfcad295bdefb04db4c295b8b5573a0f5f3d732ce384656731a4416fed6b9c9b7dd4545ad832550e8a571369e5249c04b4233676", 0x88, 0x2}, {&(0x7f0000000200)="2ce7ebf5a11a4ce0b82ca066420e00d4479d0e1f6a74e26df5d340250a3b2dd6e76e2a9b96a77f7a058a5fd8a06ed57874c46d7884d63feb34b1c07f365c932c44bf6e923ee032f580b7bc8891a6ddd920abf17a10fbdf65bfdca05544a8facb724584ead92d69a65d31469e6ecdb49b508bed1527c44dced287aa5bb9a904983ed626390c9f3ecc136a6ff5c082ae94ea88a3b8af887ef974ba94a5ba1278b9f456bc5ea77ef3b1460cc55bb806f64feb9ab39cd534a53d95038eb96549", 0xbe, 0xfffffffffffffff9}], 0x4000, &(0x7f0000000480)={[{@codepage={'codepage', 0x3d, 'iso8859-7'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'type'}}, {@fowner_lt={'fowner<', r0}}, {@fowner_gt={'fowner>', r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ppp0vboxnet1vmnet1+'}}, {@subj_type={'subj_type', 0x3d, 'type'}}, {@uid_gt={'uid>', r2}}, {@permit_directio='permit_directio'}]}) r3 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000080)={0x7ff}, 0x4) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) [ 3214.208454] hfs: unable to parse mount options [ 3214.225006] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:49:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xfffffffffffffffe, &(0x7f0000000100)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000000c0)='reno\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xe803000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:16 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180), 0x0, 0x400}], 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) [ 3214.331182] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3214.351328] hfs: can't find a HFS filesystem on dev loop1 [ 3214.426151] hfs: unable to parse mount options [ 3214.442419] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. [ 3214.475518] hfs: can't find a HFS filesystem on dev loop1 07:49:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8864000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:16 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6c01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:16 executing program 1: syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:49:16 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001a", 0x9, 0x400}], 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:16 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x88640000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3214.800770] hfs: can't find a HFS filesystem on dev loop1 [ 3214.808269] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:49:16 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd", 0xe, 0x400}], 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) [ 3214.911599] hfs: can't find a HFS filesystem on dev loop1 07:49:17 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xfa00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xe000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3215.018313] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:49:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000040)=0x7f28a4cf) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='highspeed\x00', 0xa) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:17 executing program 1: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f00000000c0)="c88dfe65d71c275f7cf0f430da65c4aba989e4eaa8a323d7ef52c2de0668c29e826183cf3f920fbd2a8ff64492cfd0458240c3a0aef6d165892684380915a1556e7d67ac2a8105067d3651dfe9673b9612137a411bac20157e44f1b6cade657363a06f050e8d26658acda53a95581f354b14d6604d934dfc112039a02f6ca6ca7a3e7316504cac6d8fff0c097d7bd56dcdb5f0dc62a96594eca0c26204639df7a64e8ea94c30d62d", 0xa8, 0x4b5}, {&(0x7f0000000180)="f719deb3ff3e4cb531814e68cc42b970b6d9720e55345a22d1edcac9f6411a007b414d6ca7d6096cc8de5c66d56d11f20b276f53f6f7636bbcd80ce4ad2a179a176a31290bddc59fda58e543a5470c4bd848550268c7d81b4ff31288bafb6b5e45b4bd112c869cf01cd8b53fcdf550ebf9d156443fa1ac43ad9b105c774df595ca69f4dc96c4e061065db85e9116b6416dab8ba498ecb26adfb1d87058af5642c504ba49eb7ae8ea2c251f0e7177c3e8fbe86cb742c795f94a7c16a37ed348dc1534738612fca4760156", 0xca, 0x3}, {&(0x7f0000000680)="95cee0d22e2e06a0f05db8fd4da7545f1e08ca5ca74cf5bfe8aad3c07d68982836614d8393fe92fef3a9a3d26bac429e1a9662579a7bfca343f712da60937108cd3f17bf9e7c18c99cf044294ef04d5a3e7c2abedeb354978c", 0x59, 0x800}, {&(0x7f0000000340)="ab1426c9bab3d5a3b71edc6460dda5db0c282a9da100bf66c54af69891bce54e88365b783d267fb9f64481eb9209c56d25c568e1b89f8c9cebf473d8ba3f847662405cedc5f1e3080a445bcb29209e36741e0a40f6565d5b2c289836d73d0d577d955fbb0e41ecd50deba39375dfae1773b2e1a5e88cb71d1f19213d54a89c21e2a8676add1b068be3ba1b00a8d3a38c8f8f321a57d851e4d9410034ccac54c682433c8c9abb9425cc5a11bc8b18078ba0455b54b33faa06fe0e6cca0e00899f0ed0dade9ed4a84fe569d291e2da44e2816202d8f049c8d20e16350b1c47ada8bdc7e2672037389b1648267569d156618d13d0bfb6b9f808970ea48d63", 0xfd, 0x6}, {&(0x7f0000000440)="bf5e140757dd51beaab0577c633f00c68c1db83841afc52bf3092ad5b13a56fc59eeb8e11d5522c18fab9a984ec68210aabe75e88638fdf2a26b7bd3c259208bb3a66a55922c0e7454fb8cf11e3949c8b6a34e49dd78554ed65090f22d6c8175fdce634109563f334e416f36625a5bff9567272f7b55f7ef6cbd35b0803b8afcf4db9e3fd71b8480830965ae4d68455887b5d04658d90a07fa7929e8cb313c75c7f3e9ad5b273796ff36a0305d47249e92f874f2b7e210532937a4ac238cf8c53464181b5fae64ae9013bbd28b88b8c50ac3f4b7c15c2dba8dcb47fb25", 0xdd, 0x7}, {&(0x7f0000000540)="51e25f122150bb33bab96c596976324d2a92109eceffa03633bc42d760a716b106e4b5f8ec826c74e7d1e4439ca808e7c7d545e9e6e111a400f73e93c57fc65b0aac5c07ca0da08c2d4cb5539f9ce5cabc7ee893ca5debb157ed439bda46afb911d4294b4ce0e8a691a10c74", 0x6c, 0x2}], 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "65dd24f9"}}]}) 07:49:17 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c9", 0x10, 0x400}], 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x4000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3215.237363] hfs: can't find a HFS filesystem on dev loop1 [ 3215.267279] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:49:17 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc900, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3215.277864] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3215.297666] hfs: can't find a HFS filesystem on dev loop1 07:49:17 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12c]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x800e000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:17 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x20, 0x12, 0x601}, 0x20}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c3d023c126285718070") read(r1, &(0x7f0000000300)=""/222, 0xfffffd4c) 07:49:17 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f", 0x11, 0x400}], 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:17 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6400000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3215.711035] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:49:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xe0000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000140)={0x0, 0x0, 0xece8}, 0xc) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x8000) 07:49:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000040)={0x7fff, 0xfffffffffffffffc, 0xab, 0xfffffffffffffe00, 0x4, 0xf8f, 0x0, 0xfffffffffffffff9, 0x1, 0x5}) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x3f) 07:49:18 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4401, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:18 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12}], 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x88caffff, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:18 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) [ 3216.197988] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. [ 3216.219024] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:18 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x3c, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:18 executing program 1: 07:49:18 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:18 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb901, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3216.590394] MINIX-fs: mounting unchecked file system, running fsck is recommended 07:49:18 executing program 1: 07:49:18 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) [ 3216.725297] minix_free_inode: bit 1 already cleared [ 3216.860624] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3216.935264] minix_free_inode: bit 1 already cleared 07:49:19 executing program 1: 07:49:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x1000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:19 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x48, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000280)="56f840045ea12abc25a36f52d84519c8f1b9dd81201b7a12f2ade9227afc1ab73c11677f08a2d6d7fa", 0x29, 0x1, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x12}, 0xf0}, 0x1c) chroot(&(0x7f0000000240)='./file0\x00') listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000040)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) sendto(r2, &(0x7f0000000140)="18bdab1f5ae15448931277c1c8b9df6560458c556eae1d0ffaa7185ed7a20c3ca962a807251910e088da34651f124b6f1b39aae98e62f4534df29b47552f10d709927b94cdb8496805b2caff060a65513b5920dd888f0f5010d9def7d1d1297d8f6f96427a8d316ddf5f88602fdd8dd8450b1b6fa66391ef694c4591caeef40a3cb4671314a4e6299144dd501e206c3923c67e4e16af4e56d8f6c67b273b7568708ccf44a2d70cfb71b4cc70a7abc14915a6c400772e87025980bfa05b5af3bbedee66147952e0807357b8bd6012a0f8e3bd2d339eeada473a734ed631b656512aa227a265db3489d7bb27cbdf", 0xed, 0x80b6fa211b99ea4a, &(0x7f0000000740)=@can={0x1d, r4}, 0x80) umount2(&(0x7f0000000300)='./file1\x00', 0x8) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000100)) 07:49:19 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) [ 3217.135556] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3217.265111] minix_free_inode: bit 1 already cleared 07:49:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x4305000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:19 executing program 1: 07:49:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x8ed) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002580)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000004c0)={@ipv4={[], [], @local}, 0x2f, r4}) listen(r3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r5, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) dup3(r3, r0, 0x80000) 07:49:19 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:19 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xde010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:19 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0xa00005, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x0, 0x0) 07:49:19 executing program 1: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'eql\x00', {0x2, 0x4e22, @multicast2}}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x20}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x53e4, 0x8004, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000020f, 0x0) [ 3217.512970] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3217.542876] MINIX-fs: mounting unchecked file system, running fsck is recommended 07:49:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x88a8ffff, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750c9b2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4138ae84, &(0x7f0000000000)) 07:49:19 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf1010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xf401, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3217.695494] minix_free_inode: bit 1 already cleared 07:49:19 executing program 1: 07:49:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x3c00, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:19 executing program 1: 07:49:20 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:20 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:20 executing program 4: 07:49:20 executing program 1: 07:49:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) listen(r2, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r3, 0x100000001}, &(0x7f0000000180)=0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xe803, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:20 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5301, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:20 executing program 4: 07:49:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xffffdd86, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:20 executing program 1: [ 3218.453799] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:20 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="24000000220007031dfffd946f610500000000000500000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 07:49:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x28, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) [ 3218.726876] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3218.756078] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3218.776532] loop1: p1 p2 p3 p4 [ 3219.076279] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3219.085998] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3219.092023] loop1: p1 p2 p3 p4 07:49:21 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:21 executing program 4: 07:49:21 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4b01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x600000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) 07:49:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x4000000000000}, 0x1c) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000140)={r2, 0x2, 0x0, "1cecfb26be8065ea8159cca51ccc5079e8a8038da634180490dbdbeec8d078aacc62db6a27c424ed61f6741edc3038342138c60777589ed6d3ac3d42970a63d9c1efbe48bc64f7769a9ef31b3037d71635ba5da0699c05a0707ab6efa7b2114c9bfaf9bc74f4e519fd9d0f438caf59e21f75ea45339dbe91649fd78bdfe90486f3f624d60ae1c209d0240fda6b5bf6b285a97f5f8947bf322b040cededfa05ed0bf0647e3507f4ee8a3b8d35e1157caf1649fffb311ca164e4d07399041cdb34c8"}) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) recvfrom$inet6(r3, &(0x7f0000000240)=""/58, 0x3a, 0x40000120, &(0x7f0000000280)={0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, [], 0x17}, 0x8}, 0x1c) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) memfd_create(&(0x7f0000000040)='.md5sum{(-,\x00', 0x4) 07:49:21 executing program 4: 07:49:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xb00000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3219.438007] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3219.460296] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3219.474982] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 07:49:21 executing program 4: [ 3219.493027] loop1: p1 p2 p3 p4 07:49:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xe8030000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:21 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xac00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:21 executing program 4: 07:49:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:22 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4901, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:22 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x1ee) listen(0xffffffffffffffff, 0x0) sendto$unix(r0, &(0x7f0000000280), 0xfe21, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x1b) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c1262858e8070") sendto$inet(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 07:49:22 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) [ 3220.247005] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 07:49:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x4, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:22 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 3220.299733] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3220.332455] loop1: p1 p2 p3 p4 07:49:22 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xde, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x14, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3220.472544] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xe80, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:22 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 3220.742586] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 3220.757898] print_req_error: 2 callbacks suppressed [ 3220.757908] print_req_error: I/O error, dev loop1, sector 201 [ 3220.757969] print_req_error: I/O error, dev loop1, sector 101 [ 3220.770481] print_req_error: I/O error, dev loop1, sector 301 [ 3220.783698] print_req_error: I/O error, dev loop1, sector 201 [ 3220.790144] Buffer I/O error on dev loop1p3, logical block 0, async page read [ 3220.797751] print_req_error: I/O error, dev loop1, sector 205 [ 3220.803729] Buffer I/O error on dev loop1p3, logical block 1, async page read [ 3220.811425] print_req_error: I/O error, dev loop1, sector 201 [ 3220.817479] Buffer I/O error on dev loop1p3, logical block 0, async page read [ 3220.825123] print_req_error: I/O error, dev loop1, sector 205 [ 3220.831043] Buffer I/O error on dev loop1p3, logical block 1, async page read [ 3220.838156] print_req_error: I/O error, dev loop1, sector 1 [ 3220.838630] print_req_error: I/O error, dev loop1, sector 201 [ 3220.850168] Buffer I/O error on dev loop1p3, logical block 0, async page read [ 3220.857750] print_req_error: I/O error, dev loop1, sector 205 [ 3220.863692] Buffer I/O error on dev loop1p3, logical block 1, async page read [ 3220.871316] Buffer I/O error on dev loop1p4, logical block 0, async page read [ 3220.878752] Buffer I/O error on dev loop1p4, logical block 1, async page read [ 3220.886218] Buffer I/O error on dev loop1p4, logical block 2, async page read 07:49:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x800e0000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3220.893538] Buffer I/O error on dev loop1p4, logical block 3, async page read 07:49:22 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:23 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2d00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:23 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) 07:49:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x7000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x1, 0x1, [@empty]}) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:23 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xf4010000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3221.288704] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3221.310516] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3221.352484] loop1: p1 p2 p3 p4 07:49:23 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 3221.393258] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8035, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:23 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xec010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x6488, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000480), &(0x7f00000004c0)=0x4) 07:49:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x3580, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3221.871461] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3221.886354] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3221.893210] loop1: p1 p2 p3 p4 07:49:24 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:24 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2a010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xfffffffffffff000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x40000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x44600010}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x1c8, r3, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x81}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10001}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x401}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1ff}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fff}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xc0d}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xaf}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @broadcast}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x8c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x4000}, 0x44000) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:24 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) 07:49:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8847, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3222.440360] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8906000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3222.518715] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3222.534004] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3222.544673] loop1: p1 p2 p3 p4 07:49:24 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb600, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x1f4, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:25 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c01]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x81000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:25 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1c5, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) [ 3223.115810] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3223.154314] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3223.175869] loop1: p1 p2 p3 p4 07:49:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='dctcp-reno\x00', 0xb) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xf000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:25 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xcc, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') 07:49:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xf0, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3223.455546] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3223.491068] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3223.497143] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3223.511853] loop1: p1 p2 p3 p4 07:49:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x6000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:25 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x99, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x2, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) 07:49:25 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:25 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5d01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3223.975478] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3223.990655] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3224.011682] loop1: p1 p2 p3 p4 07:49:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffff8001, 0x0, 0x8}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x6, 0x8000, 0x8001, 0x401, r3}, 0x10) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000180)={{0x0, 0x1, 0x1f, 0x2, 0x8}, 0x80, 0x400, 'id0\x00', 'timer1\x00', 0x0, 0xffff, 0x335, 0xffffffff, 0x20}) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xb000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:26 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x29000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 07:49:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xb00, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3224.323739] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:26 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc8010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3224.365886] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 07:49:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x3, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3224.432104] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3224.446332] loop1: p1 p2 p3 p4 07:49:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:26 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x608, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:27 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) 07:49:27 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb6, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="1cf79336345cc7b30d1c37db09ca4a", 0xf, 0x0) keyctl$invalidate(0x15, r1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x400000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:27 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xe000000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3225.275664] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3225.292549] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3225.305417] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 07:49:27 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8500000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3225.356592] loop1: p1 p2 p3 p4 07:49:27 executing program 4: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x89060000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:27 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) 07:49:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x43050000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:27 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:27 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6b01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3225.835878] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3225.877374] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3225.906120] loop1: p1 p2 p3 p4 07:49:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000580)={0x0, 0x0, 0x2080}) listen(r2, 0x0) ioctl$TCXONC(r1, 0x540a, 0xbe5b) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8906, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:28 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:28 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x51000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) 07:49:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8100, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3226.234193] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3226.307494] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3226.337699] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 07:49:28 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2800, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3226.356228] loop1: p1 p2 p3 p4 07:49:28 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:28 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x2800, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)) 07:49:28 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7d, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3226.750815] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3226.805539] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3226.812311] loop1: p1 p2 p3 p4 07:49:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000180)={r3, @in={{0x2, 0x4e24, @remote}}, 0x7, 0x101}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000002c0)={0xa, [0x401, 0x0, 0x10001, 0x7fff, 0x13, 0x1, 0x0, 0xff, 0x0, 0x4]}, &(0x7f0000000300)=0x18) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000040)=[{0x2, 0x1}, {0x0, 0x6}, {0x8, 0x20}, {0x3, 0x2e}, {0xf, 0xb12}, {}, {0xc, 0xffffffffffffffc1}, {0x4, 0xfffffffffffffffb}], 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000240)=[@in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e20, 0xf2e, @dev={0xfe, 0x80, [], 0x1f}, 0x6}, @in6={0xa, 0x4e24, 0x4, @local, 0x5404}], 0x48) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r6, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x700000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:29 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xbc, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 07:49:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x200000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 3227.199989] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3227.219218] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3227.232705] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3227.250334] loop1: p1 p2 p3 p4 07:49:29 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:29 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6600000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:29 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8847000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r3, 0x7ff}, 0x8) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000001c0)="e4f661429c08b0", 0x7) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:30 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3401, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x300000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:30 executing program 1: syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 07:49:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0xa0008000, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3228.075972] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3228.089158] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3228.100807] loop1: p1 p2 p3 p4 07:49:30 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3d, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3228.195329] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8035000000000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:30 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:30 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 07:49:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x86ddffff, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:30 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x18d, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 3228.676575] ldm_validate_privheads(): Disk read failed. [ 3228.682200] loop1: p1 p2 p3 p4 [ 3228.703244] loop1: partition table partially beyond EOD, truncated [ 3228.723881] loop1: p1 start 1 is beyond EOD, truncated [ 3228.745196] loop1: p2 start 101 is beyond EOD, truncated [ 3228.750948] loop1: p3 start 201 is beyond EOD, truncated [ 3228.757417] loop1: p4 start 301 is beyond EOD, truncated 07:49:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[{0x3, 0x2}, {0x8, 0x7}, {0x3, 0x9}, {0x4, 0x5}], 0x4) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:30 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x6000000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:30 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5d00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:30 executing program 1: syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) 07:49:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8848, 0x0, 0x28}}}}}, &(0x7f0000000380)) [ 3229.048449] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x700, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:31 executing program 1: syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) 07:49:31 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:31 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xdc000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x4305, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:49:31 executing program 1: syz_read_part_table(0x0, 0x0, &(0x7f0000000200)) 07:49:31 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x6000000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:31 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x24010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000100)=ANY=[]}, 0x8000) 07:49:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) readahead(r0, 0x5df, 0x3) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x700000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x0, 0x1, 0x0, &(0x7f0000000040)}, 0x20) 07:49:32 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x11000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3229.988345] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:32 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8000a0ffffffff, 0x28}}}}}, &(0x7f0000000380)) 07:49:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x0, 0x1, 0x0, &(0x7f0000000040)}, 0x20) 07:49:32 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x15, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="2e2f6367726f75702f00007a30009036a395411cf5ee8a6adf0acbf0ced92c466abdad8921f9009f80d501296329aaba92e1d6a60f5441166a776c1a9225201d59ed87625fc49772f63875f47e671bf3670e163746ce93efe19181e3c72adb848224aa8fd62098810cf45299b2872345cc4763f20f73edffc7ed3e5a799209cdc80c3c210d185b15c87e8f505c464da9aca6426ac88b9d05c10b84e2285d280ec29270094ddb429fdc85d43464a73e4e341f6e99d35021b26752dbd19560ad66db28244295d1ef159e6b08c717753ccbecde9220f1015821798e0c1e6f846f121b17b3d7254d77b95b0b19420a876c9bac6e867474ebb7f9728216ac12c90000000000000000000000", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x0, 0x1, 0x0, &(0x7f0000000040)}, 0x20) 07:49:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xe8030000, 0x28}}}}}, &(0x7f0000000380)) 07:49:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x0, 0x1, 0x0, &(0x7f0000000040)}, 0x20) 07:49:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_tcp_int(r2, 0x6, 0x17, &(0x7f0000000240), &(0x7f0000000280)=0x4) perf_event_open(&(0x7f00000001c0)={0x5d2d8bc5c20c6548, 0x70, 0x7fff, 0x10001, 0x7, 0x1, 0x0, 0x10001, 0x18bd0, 0x5, 0x6be, 0xffff, 0xfff, 0x200, 0x0, 0x100, 0x6c87bbfd, 0x3ffc00000, 0x1, 0x62, 0x5, 0x3, 0x3ff, 0x10000, 0x7, 0x3, 0x3, 0x4, 0x0, 0x100, 0x800, 0x2, 0x5, 0x80000001, 0x7fff, 0x8, 0x9, 0x6, 0x0, 0x7f, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x10820, 0x1, 0x2, 0xf, 0x5, 0x8, 0x2}, 0xffffffffffffffff, 0x1, r1, 0x3) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) renameat(r1, &(0x7f00000002c0)='./file0\x00', r1, &(0x7f0000000300)='./file0\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000040)={0x17, 0x62, &(0x7f0000000100)="8a827b0349ef3654d3bd6e38ab553ddee9ec2ee302eae09ab4b1dc4fb3674075beb5831677e1526cae4038a7d336e12a324ebce63a23879d74fa188d4b5badc01c3d63a774e54b606d5f25173c95cc4a5c00472743118464580a62d4f6b2423b3ed8"}) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:32 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x73000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:32 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:32 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x81000000, 0x28}}}}}, &(0x7f0000000380)) [ 3230.930379] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xe000, 0x28}}}}}, &(0x7f0000000380)) 07:49:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000040)}, 0x20) 07:49:33 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000f98000), 0xfffffffffffffff3, 0x2000000c, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:33 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:33 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1f00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x1400, 0x28}}}}}, &(0x7f0000000380)) 07:49:33 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x0, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x0, 0x1, 0x0, &(0x7f0000000040)}, 0x20) 07:49:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xf0ffffffffffff, 0x28}}}}}, &(0x7f0000000380)) 07:49:33 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000040)}, 0x20) 07:49:33 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x164, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) listen(r2, 0x0) faccessat(r1, &(0x7f0000000140)='./file0\x00', 0x40, 0x400) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:33 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x0, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="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", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) 07:49:33 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x800e000000000000, 0x28}}}}}, &(0x7f0000000380)) [ 3231.838777] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x2000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:34 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000f98000), 0xfffffffffffffff3, 0x0, &(0x7f00004a5fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:49:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x400000000000485, &(0x7f0000000040)=""/24, &(0x7f00000002c0)=0x18) 07:49:34 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:34 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x174, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:34 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba000000000800000000000019", @ANYRES32=0x0], 0x2}}, 0x0) 07:49:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x600000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000040)={0xb, 0x413, 0x4, 0x4000, r2}) memfd_create(&(0x7f0000000100)='yeah\x00', 0x1) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x14000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:34 executing program 1: sched_setaffinity(0x0, 0xffffff55, &(0x7f00000000c0)=0x5) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000240)=0x5) getgroups(0x0, &(0x7f0000000340)) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') r3 = gettid() perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x5, 0x740, 0x8, 0x96c, 0x0, 0x3, 0x9400, 0x9, 0x40, 0x5, 0x100000001, 0x8001, 0x8001, 0x1f, 0x0, 0xfffffffffffffffd, 0x10001, 0x10000, 0x7941, 0x0, 0x40, 0x0, 0x8001, 0x81, 0x60000000000000, 0x9, 0x4, 0x4, 0x0, 0x101, 0x1, 0x10000, 0x1e3, 0x5, 0x1ff, 0x9, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x8800, 0xc08a, 0x91, 0x6, 0xfffffffffffffe9d, 0x1, 0x6}, r3, 0x2, r0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ac0)=[{{&(0x7f0000000b40)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000d80)=""/223, 0xdf}], 0x1, &(0x7f0000001540)=""/145, 0x91}}], 0x1, 0x0, &(0x7f0000003c80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004180)={{{@in6=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006f40)={@mcast2}, &(0x7f0000006f80)=0x14) 07:49:34 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x152, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:34 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x60000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') [ 3232.775862] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:35 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x700, 0x28}}}}}, &(0x7f0000000380)) 07:49:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:35 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x300, 0x28}}}}}, &(0x7f0000000380)) 07:49:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(0xffffffffffffffff, r1, 0x80000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x8000, 0x2, 0x7, 0x2, 0x0, 0x7fff, 0x80000, 0x6, 0x100000000, 0x7, 0x4, 0x1, 0x101, 0x8, 0x3, 0x2, 0xc31, 0x1a5, 0x4, 0x4e0, 0x1e0, 0x3d, 0x0, 0x3, 0x6400000000000000, 0x9, 0x1, 0xfffffffffffffe00, 0x800, 0xe03, 0x2, 0x8, 0x1, 0xc818, 0x9, 0xff, 0x0, 0x4f, 0x6, @perf_bp={&(0x7f0000000140), 0x1}, 0xc002, 0x5, 0x6, 0x9, 0x1, 0x7, 0x6}, r4, 0x4, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000040)={0x3, 0xffffffffffffff9c}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r5, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) 07:49:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x86ddffff00000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:35 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5a000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x425, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_LINKINFO={0x14, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 07:49:35 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8, 0x28}}}}}, &(0x7f0000000380)) 07:49:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') [ 3233.688994] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:36 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) r2 = dup(r1) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000280)={0x4, 0x7, [{0x7, 0x0, 0x7}, {0x0, 0x0, 0x204f}, {0xf90, 0x0, 0x5}, {0x97f, 0x0, 0x1}]}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) r3 = syz_open_dev$amidi(&(0x7f00000003c0)='/dev/amidi#\x00', 0x5, 0x10100) shmctl$SHM_LOCK(0x0, 0xb) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000300)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = accept(r0, &(0x7f0000000140)=@nfc, &(0x7f00000000c0)=0x80) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setgid(r5) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000440)=ANY=[@ANYRES32=0x0], &(0x7f0000000500)=0x1) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000540)={0x0, 0x0, 0x401, 0x7ff, r6}, 0x10) 07:49:36 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x90000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:36 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xd00000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0), 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000040)="661a9741e7330406e7938da021f58c0b9385fc1e40c7b06ac57f064c1a6870ea76dd9d839cd8fd81ffbf0420", &(0x7f0000000100)=""/171}, 0x18) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:36 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6a00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8847000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:36 executing program 4: fchdir(0xffffffffffffffff) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8864, 0x28}}}}}, &(0x7f0000000380)) 07:49:36 executing program 4: fchdir(0xffffffffffffffff) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') [ 3234.623358] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:36 executing program 4: fchdir(0xffffffffffffffff) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:37 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:37 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x36010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x2, 0x28}}}}}, &(0x7f0000000380)) 07:49:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(0xffffffffffffffff) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(twofish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = accept$unix(r1, 0x0, &(0x7f0000005f00)) sendmmsg$unix(r2, &(0x7f00000059c0)=[{&(0x7f0000000d00)=@abs, 0x6e, &(0x7f0000001200)=[{&(0x7f00000010c0)}], 0x1, &(0x7f0000001280), 0x0, 0x4000054}], 0x1, 0x4004) 07:49:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(0xffffffffffffffff) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x800e0000, 0x28}}}}}, &(0x7f0000000380)) 07:49:37 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xae, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) timerfd_create(0x6, 0x80000) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:37 executing program 1: set_mempolicy(0x8003, &(0x7f0000000180)=0x5, 0x5) syz_mount_image$iso9660(&(0x7f0000000440)='iso9660\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)) 07:49:37 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8906000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(0xffffffffffffffff) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') [ 3235.577327] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3235.658514] ISOFS: Unable to identify CD-ROM format. 07:49:38 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffff]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) quotactl(0x0, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:38 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x13a, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x6, 0x28}}}}}, &(0x7f0000000380)) 07:49:38 executing program 1: 07:49:38 executing program 1: 07:49:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) quotactl(0x0, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xa0008000, 0x28}}}}}, &(0x7f0000000380)) 07:49:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000040)=0x9, 0x4) listen(r3, 0x0) write$UHID_DESTROY(r2, &(0x7f0000000100), 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:49:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8000a0, 0x28}}}}}, &(0x7f0000000380)) 07:49:38 executing program 1: 07:49:38 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x107, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3236.489403] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:38 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) quotactl(0x0, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)='-') 07:49:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x6000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:38 executing program 1: 07:49:38 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd901000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)) 07:49:39 executing program 1: 07:49:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x4000, 0x28}}}}}, &(0x7f0000000380)) 07:49:39 executing program 3: 07:49:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000001240)='veth1\x00', 0x10) r1 = socket$inet6(0xa, 0x100000803, 0x200000000009) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0a5c2d023c12629d718070") connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000380), 0xffffffffffffff33, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x802}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=@delqdisc={0x100, 0x25, 0x0, 0x0, 0x0, {0x0, r2}, [@TCA_STAB={0x94, 0x8, [@TCA_STAB_DATA={0x10, 0x2, [0x2, 0x7, 0x9f98, 0x4, 0x73]}, @TCA_STAB_DATA={0xc, 0x2, [0xffffffff, 0x6d66, 0xe3, 0x65]}, @TCA_STAB_BASE={0x1c, 0x1, {0x6, 0x722c, 0x3ff, 0x7, 0x3, 0x9, 0x6, 0x9}}, @TCA_STAB_DATA={0x18, 0x2, [0x9, 0x1, 0x2, 0x7, 0x8, 0x5, 0x2, 0x7fc00, 0x8]}, @TCA_STAB_BASE={0x1c, 0x1, {0xffffffffffffffe0, 0x80000000, 0x8, 0x1, 0x3, 0x3000000000000, 0x8, 0x9}}, @TCA_STAB_BASE={0x1c, 0x1, {0x200, 0xd6, 0x35, 0x20, 0x1, 0x35, 0xd9c, 0x7}}, @TCA_STAB_DATA={0x8, 0x2, [0x80]}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @TCA_STAB={0x40, 0x8, [@TCA_STAB_DATA={0x10, 0x2, [0x0, 0x4, 0x9, 0x8, 0x1]}, @TCA_STAB_DATA={0x14, 0x2, [0x2, 0x5, 0x5c, 0x8, 0x8001, 0x8, 0xfff, 0xfffffffffffffffd]}, @TCA_STAB_DATA={0x10, 0x2, [0x81, 0x0, 0x8, 0xaa45, 0x1, 0x0]}, @TCA_STAB_DATA={0x4}, @TCA_STAB_DATA={0x4}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x84}, 0x4000) sendmmsg(r0, &(0x7f0000009a40)=[{{&(0x7f0000005200)=@sco={0x1f, {0x7}}, 0x80, &(0x7f00000054c0)=[{&(0x7f0000005280)='-', 0x1}], 0x1, &(0x7f0000005500)}}], 0x1, 0x20000000) 07:49:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)) 07:49:39 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4e00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r0) quotactl(0x2080000201, &(0x7f0000000100)='./file2\x00', 0x0, &(0x7f00000001c0)) 07:49:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x6488, 0x28}}}}}, &(0x7f0000000380)) 07:49:39 executing program 3: 07:49:39 executing program 1: 07:49:39 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:39 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa6000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:39 executing program 3: 07:49:39 executing program 4: 07:49:39 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xd, 0x28}}}}}, &(0x7f0000000380)) 07:49:40 executing program 1: 07:49:40 executing program 4: 07:49:40 executing program 3: 07:49:40 executing program 1: 07:49:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x800000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:40 executing program 4: 07:49:40 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1b5, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:40 executing program 4: 07:49:40 executing program 3: 07:49:40 executing program 1: 07:49:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x400000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:40 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:40 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x14, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:40 executing program 4: 07:49:40 executing program 3: 07:49:40 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x2800000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:40 executing program 1: 07:49:41 executing program 4: 07:49:41 executing program 1: 07:49:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x4305, 0x28}}}}}, &(0x7f0000000380)) 07:49:41 executing program 1: 07:49:41 executing program 3: 07:49:41 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7f00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:41 executing program 1: 07:49:41 executing program 4: 07:49:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xffffdd86, 0x28}}}}}, &(0x7f0000000380)) 07:49:41 executing program 3: 07:49:41 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:41 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb1010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:41 executing program 4: 07:49:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 07:49:41 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:41 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x3, 0x28}}}}}, &(0x7f0000000380)) 07:49:42 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc700, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:42 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c3d023c126285718070") sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 07:49:42 executing program 4: 07:49:42 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x4, 0x28}}}}}, &(0x7f0000000380)) 07:49:42 executing program 4: 07:49:42 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff1f00]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:42 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xf401000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:42 executing program 4: 07:49:42 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb700000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000680)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f6448d85c009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a512f40f91f838f3bd88e30a3e49218b508a531120a21153362466ae8a92ad0bb119d30ca487b46d6a4de94e1c78e52c6ac213e653779ccdeb4b62a64da6e06cc49b520b583963c758b2f94f2c10db28ceb85d16176ba928a3953c2c482e5f977ca4edf12c365d1d8350f1995bb9286b4fb96f76f79f1ed42ec1129ca328bc5f6af8aa7d7ba97bc5cf4edda4f9286a62ed142abb8f5f2a11d643cee4", 0xf6}], 0x1) 07:49:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x80350000, 0x28}}}}}, &(0x7f0000000380)) [ 3240.717015] netlink: 64 bytes leftover after parsing attributes in process `syz-executor3'. 07:49:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:49:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0xb0, 0x0, 0x4, [{{}, {0x0, 0x0, 0x5, 0x0, 'fuse\x00'}}]}, 0xb0) 07:49:42 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:42 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xae01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xf401, 0x28}}}}}, &(0x7f0000000380)) 07:49:43 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:43 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xb, 0x28}}}}}, &(0x7f0000000380)) 07:49:43 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc2010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x200000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:43 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x6, 0x0, [{0x38d}]}) 07:49:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8100000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:43 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:43 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x88a8ffff, 0x28}}}}}, &(0x7f0000000380)) 07:49:44 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x3, 0x85a1035adf4fb4ed) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0), 0xc) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x100000000) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) sendfile(r2, r3, &(0x7f0000000240), 0x20000102000007) 07:49:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x0, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x6000, 0x28}}}}}, &(0x7f0000000380)) 07:49:44 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:44 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb200, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x0, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x28, 0x28}}}}}, &(0x7f0000000380)) 07:49:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x0, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[], 0x0) 07:49:44 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x608, 0x28}}}}}, &(0x7f0000000380)) 07:49:44 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6d01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x100000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:45 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:45 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x18a, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:45 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:45 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote}, @in=@dev, {}, {}, {}, 0x70bd25}}}, 0xf8}}, 0x0) 07:49:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xb000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:45 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd900000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:45 executing program 4: getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x7d8}, &(0x7f0000000340)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000080)=@ipx, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000001540)=""/4096, 0x1000}}], 0x400000000000096, 0x0, 0x0) 07:49:45 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:45 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f0000001400)={&(0x7f0000000940)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@local, @in=@multicast1}, {@in=@remote, 0x0, 0x6c}, @in=@dev}}}, 0xf8}}, 0x0) 07:49:45 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xbe000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3243.782467] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 3243.838155] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 3243.869355] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 07:49:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="030000000000000008001b0000000000e55a81be00883a59863ad87e37957acfbdcd2d666e63626fbce839e31af36bb4fc0981e490b24cfd58c5e3e43a1a39fde5acf7452680fe6a85021ea9ded272974d79b6c3b3ee90fd1f924ecb1f8f8b39014b409c2a59bb06"], 0x1}}, 0x0) 07:49:46 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff1f0000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8848, 0x28}}}}}, &(0x7f0000000380)) 07:49:46 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000380)="000000000000000000000000000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30254d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6287c64dbea37a", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000100)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000500)={'syz'}, &(0x7f0000000540)="670e1cc29261", 0x6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r2, r3}, &(0x7f0000000400)=""/240, 0xf0, 0x0) sendfile(r0, r1, &(0x7f0000000040), 0x20000102000007) socket$l2tp(0x18, 0x1, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400), 0x0) 07:49:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xd00, 0x28}}}}}, &(0x7f0000000380)) 07:49:46 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf4000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3244.568451] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 3244.601440] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 3244.626583] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 07:49:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8847, 0x28}}}}}, &(0x7f0000000380)) 07:49:46 executing program 4: getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x7d8}, &(0x7f0000000340)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000080)=@ipx, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000001540)=""/4096, 0x1000}}], 0x400000000000096, 0x0, 0x0) 07:49:46 executing program 1: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff4c, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7fffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x80000000, 0x10000, 0x3}, 0xc) epoll_create(0xdaf) r1 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) sendfile(r2, r3, &(0x7f0000000240), 0x20000102000007) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) 07:49:46 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x501, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xfffffffffffff000, 0x28}}}}}, &(0x7f0000000380)) [ 3244.790446] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 3244.838112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 3244.857757] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 07:49:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xe803, 0x28}}}}}, &(0x7f0000000380)) 07:49:47 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x10c, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:47 executing program 1: r0 = socket(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000200)="0a5c2d023cfd2185718070") r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @rand_addr}]}, 0x20}}, 0x0) 07:49:47 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:47 executing program 1: 07:49:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xe803000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:47 executing program 4: 07:49:47 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1f01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:47 executing program 1: 07:49:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xfffff000, 0x28}}}}}, &(0x7f0000000380)) 07:49:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:47 executing program 1: 07:49:47 executing program 4: 07:49:47 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xe0000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:48 executing program 1: socket$inet6(0xa, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000300), &(0x7f0000000340)=0x1) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value, 0x8) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000780), 0x4) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000400)=0x8) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000480)) fcntl$getflags(0xffffffffffffffff, 0x408) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x810440, 0x0) modify_ldt$read_default(0x2, &(0x7f00000005c0)=""/184, 0xb8) umount2(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$jfs(&(0x7f00000007c0)='jfs\x00', &(0x7f0000000800)='./file0\x00', 0x8000, 0x1, &(0x7f0000000ac0)=[{&(0x7f0000000a80)}], 0x0, &(0x7f0000000b40)={[], [{@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<'}}, {@seclabel='seclabel'}, {@dont_appraise='dont_appraise'}, {@dont_measure='dont_measure'}]}) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={r1, 0x5, 0x6, 0x8}, 0x10) 07:49:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xc452) 07:49:48 executing program 4: 07:49:48 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8906, 0x28}}}}}, &(0x7f0000000380)) 07:49:48 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3c01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:48 executing program 4: 07:49:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xffffa888, 0x28}}}}}, &(0x7f0000000380)) 07:49:48 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(r0, 0x407, 0xc452) [ 3246.271282] MINIX-fs: mounting unchecked file system, running fsck is recommended 07:49:48 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xc401000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8864000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:48 executing program 4: [ 3246.395694] minix_free_inode: bit 1 already cleared 07:49:48 executing program 1: 07:49:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x28000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x3c00, 0x28}}}}}, &(0x7f0000000380)) 07:49:49 executing program 4: 07:49:49 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x95010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:49 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:49 executing program 1: 07:49:49 executing program 1: 07:49:49 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:49 executing program 4: 07:49:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x800e, 0x28}}}}}, &(0x7f0000000380)) 07:49:49 executing program 1: 07:49:49 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x10000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:49 executing program 4: 07:49:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8848000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:49 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:49 executing program 1: 07:49:49 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:49 executing program 4: 07:49:49 executing program 1: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="2f0000001800030007fffd946fa283bc8020000000040005031d856808000f000800000016ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) 07:49:49 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:49 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x806000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:49 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5b00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:50 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000140)={{0x0, @local, 0x0, 0x0, 'none\x00'}, {@broadcast, 0x4e24}}, 0x44) 07:49:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 07:49:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x43050000, 0x28}}}}}, &(0x7f0000000380)) 07:49:50 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2f706f731d785f61636c5f616363657373ff", &(0x7f00000001c0), 0x24, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 3248.087517] IPVS: set_ctl: invalid protocol: 0 172.20.20.170:0 [ 3248.104376] autofs4:pid:22891:autofs_fill_super: called with bogus options [ 3248.123453] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:49:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x543, 0x28}}}}}, &(0x7f0000000380)) 07:49:50 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:50 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:50 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe600000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:50 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000001c40), 0xc, &(0x7f0000001c80)={&(0x7f0000000040)=ANY=[@ANYBLOB="1f8b0000cecf3fb06e5913713a1668e83d8644f0a01376cac3d0d59aebd28d11283df846de1e705ca65f6f154bf254bcb1c8aafc73d7023c252bcb3a2145"], 0x1}}, 0x0) r0 = socket$inet6(0xa, 0x40000000000803, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 07:49:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xe000000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:50 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x4000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:50 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x0) fcntl$setpipe(r0, 0x407, 0xc452) 07:49:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000600)) 07:49:50 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xc452) 07:49:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xd000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000300)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000500)='\x00', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000600)='lo\x00', 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), 0x14) recvmsg(r0, &(0x7f00000000c0)={&(0x7f00000003c0)=@can, 0x80, &(0x7f0000001700)=[{&(0x7f0000000200)=""/241, 0xf1}], 0x1, &(0x7f00000017c0)=""/70, 0x46}, 0x22) 07:49:51 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x5401, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:51 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:49:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xffffca88, 0x28}}}}}, &(0x7f0000000380)) 07:49:51 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xce00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="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") preadv(r0, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000001380)=""/159, 0x9f}], 0x2, 0x0) 07:49:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x14, 0x28}}}}}, &(0x7f0000000380)) 07:49:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="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") preadv(r0, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000001380)=""/159, 0x9f}], 0x2, 0x0) 07:49:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x4305000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:51 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) fcntl$setpipe(r0, 0x407, 0x0) 07:49:51 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xff01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="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") preadv(r0, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/119, 0x77}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x2, 0x0) 07:49:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8060000, 0x28}}}}}, &(0x7f0000000380)) 07:49:52 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:52 executing program 1: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$inet_int(r0, 0x0, 0x40000000000d1, &(0x7f0000000080), 0x4) 07:49:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x3e8, 0x28}}}}}, &(0x7f0000000380)) 07:49:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0)={0x0}, &(0x7f0000000380)=0x8) lseek(0xffffffffffffffff, 0x0, 0x4) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0)={r1, 0x401}, &(0x7f0000000400)=0x8) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000200)="c4e2d94558b166b824010f00d866ba4100b80de4c029efdb06c4c1bdd9736f0fc799faffffff66baf80cb8a8a5048aef66bafc0ced66b82a008ee8b8010000000f01d9c4e27917d5", 0x48}], 0x1, 0x20, &(0x7f0000000140), 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x2, @loopback}}, 0x1e) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x10, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 07:49:52 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x139, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xf000, 0x28}}}}}, &(0x7f0000000380)) 07:49:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[@ANYBLOB="1800000016000102000000000000000023680000", @ANYRES32=0x0], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 07:49:52 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8900000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000080)=0xffff7ffffffffffd, 0xfd89) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x4, 0xfffffffffffffffe}, 0x8) close(r0) 07:49:52 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x4888, 0x28}}}}}, &(0x7f0000000380)) [ 3250.853474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:49:52 executing program 3: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:49:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x600, 0x28}}}}}, &(0x7f0000000380)) 07:49:53 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x2800, 0x28}}}}}, &(0x7f0000000380)) 07:49:53 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb9010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0)={0x0}, &(0x7f0000000380)=0x8) lseek(0xffffffffffffffff, 0x0, 0x4) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0)={r1, 0x401}, &(0x7f0000000400)=0x8) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000200)="c4e2d94558b166b824010f00d866ba4100b80de4c029efdb06c4c1bdd9736f0fc799faffffff66baf80cb8a8a5048aef66bafc0ced66b82a008ee8b8010000000f01d9c4e27917d5", 0x48}], 0x1, 0x20, &(0x7f0000000140), 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x2, @loopback}}, 0x1e) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x10, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 07:49:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10}, 0x10) 07:49:53 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x23}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:49:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xffffffffa0008000, 0x28}}}}}, &(0x7f0000000380)) 07:49:53 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3d00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'security.', '+$$+md5sumcpuset]&\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:49:53 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x3000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:53 executing program 3: 07:49:53 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2700, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:54 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x40000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:54 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd2, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000009000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="c4c2f9bdd066bad10466b81f0066efb9880400000f320f01bbe1d6000066ba2100ed660f388121660ff1d0b98d090000b80d000000ba000000000f300fd7f766baf80cb877d4418cef66bafc0cb03dee", 0x50}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:49:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10}, 0x10) 07:49:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x1, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) bind$bt_hci(r0, &(0x7f0000001800), 0xc) flock(0xffffffffffffffff, 0x0) 07:49:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x88caffff, 0x28}}}}}, &(0x7f0000000380)) 07:49:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x3c00000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x386}], 0x1000024b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='limits\x00') preadv(r0, &(0x7f0000000480), 0x100000000000002e, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @speck128, 0x0, "54db32e6bea06403"}) 07:49:54 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1ce, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:54 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='mounts\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 07:49:54 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x88480000, 0x28}}}}}, &(0x7f0000000380)) 07:49:55 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcff0000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:55 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae05, &(0x7f0000000140)={0x2}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffff0000) ppoll(&(0x7f0000000000)=[{r3}], 0x1, &(0x7f00000000c0), &(0x7f0000000140), 0x8) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x6, {0x2, 0x4e21, @remote={0xac, 0x4}}, {0x2, 0x4e21, @loopback=0x7f000002}, {0x2, 0x4e20, @broadcast}, 0x22, 0x1, 0x1, 0x3, 0x0, 0x0, 0x7, 0x800, 0x200}) r5 = dup3(r2, r2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000400)={0x2, "7665746831000000000000001100"}, 0x18) r6 = memfd_create(&(0x7f0000000800)="2f7565762f6c6f6e71230070d06857100100004f8f060cced952", 0x0) r7 = dup(r5) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000028c0)) r8 = accept4$packet(r6, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x80}, &(0x7f0000000300)=0xfffffffffffffda3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000340)={r9, @in={{0x2, 0x4e21, @local}}, 0x6, 0xfffffffffffffffd, 0x0, 0x8, 0xa0}, 0x98) pwritev(r8, &(0x7f0000001a80)=[{&(0x7f0000001a00)="f92c41da234abbf81090d3bb3e9b97c94f2d07a01f4e515051bb7d815e23b1e160d340f1b0cdd8e84266801184aae73561f6dcecbdd3357c509ed54eefa58af1c4751e5e014d37142547ed501178100338a498d5657a4dd71f55", 0x5a}], 0x1, 0x0) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000440)={0x1, 0x40}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x200100, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') r11 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r11, 0x227a, &(0x7f0000000000)) r12 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r10, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="d8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000092fcf80bc7cf0003c9b6c403430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000c94cba45ec5799639fcefd326199e1390000000000000000000000000000000000"]) getsockopt$IP_VS_SO_GET_DAEMON(r12, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000100)=0xf) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000640)) 07:49:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x3580, 0x28}}}}}, &(0x7f0000000380)) 07:49:55 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1e2, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10}, 0x10) 07:49:55 executing program 4: 07:49:55 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1b01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x7000000, 0x28}}}}}, &(0x7f0000000380)) [ 3253.336254] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 0, id = 0 07:49:55 executing program 4: 07:49:55 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae05, &(0x7f0000000140)={0x2}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffff0000) ppoll(&(0x7f0000000000)=[{r3}], 0x1, &(0x7f00000000c0), &(0x7f0000000140), 0x8) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x6, {0x2, 0x4e21, @remote={0xac, 0x4}}, {0x2, 0x4e21, @loopback=0x7f000002}, {0x2, 0x4e20, @broadcast}, 0x22, 0x1, 0x1, 0x3, 0x0, 0x0, 0x7, 0x800, 0x200}) r5 = dup3(r2, r2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000400)={0x2, "7665746831000000000000001100"}, 0x18) r6 = memfd_create(&(0x7f0000000800)="2f7565762f6c6f6e71230070d06857100100004f8f060cced952", 0x0) r7 = dup(r5) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000028c0)) r8 = accept4$packet(r6, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x80}, &(0x7f0000000300)=0xfffffffffffffda3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000340)={r9, @in={{0x2, 0x4e21, @local}}, 0x6, 0xfffffffffffffffd, 0x0, 0x8, 0xa0}, 0x98) pwritev(r8, &(0x7f0000001a80)=[{&(0x7f0000001a00)="f92c41da234abbf81090d3bb3e9b97c94f2d07a01f4e515051bb7d815e23b1e160d340f1b0cdd8e84266801184aae73561f6dcecbdd3357c509ed54eefa58af1c4751e5e014d37142547ed501178100338a498d5657a4dd71f55", 0x5a}], 0x1, 0x0) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000440)={0x1, 0x40}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x200100, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') r11 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r11, 0x227a, &(0x7f0000000000)) r12 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r10, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="d8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000092fcf80bc7cf0003c9b6c403430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000c94cba45ec5799639fcefd326199e1390000000000000000000000000000000000"]) getsockopt$IP_VS_SO_GET_DAEMON(r12, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000100)=0xf) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000640)) 07:49:55 executing program 4: 07:49:55 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x88470000, 0x28}}}}}, &(0x7f0000000380)) 07:49:56 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:56 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xea01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:56 executing program 4: 07:49:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8100, 0x28}}}}}, &(0x7f0000000380)) 07:49:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10}, 0x10) 07:49:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xf0ffff, 0x28}}}}}, &(0x7f0000000380)) 07:49:56 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae05, &(0x7f0000000140)={0x2}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffff0000) ppoll(&(0x7f0000000000)=[{r3}], 0x1, &(0x7f00000000c0), &(0x7f0000000140), 0x8) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x6, {0x2, 0x4e21, @remote={0xac, 0x4}}, {0x2, 0x4e21, @loopback=0x7f000002}, {0x2, 0x4e20, @broadcast}, 0x22, 0x1, 0x1, 0x3, 0x0, 0x0, 0x7, 0x800, 0x200}) r5 = dup3(r2, r2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000400)={0x2, "7665746831000000000000001100"}, 0x18) r6 = memfd_create(&(0x7f0000000800)="2f7565762f6c6f6e71230070d06857100100004f8f060cced952", 0x0) r7 = dup(r5) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000028c0)) r8 = accept4$packet(r6, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x80}, &(0x7f0000000300)=0xfffffffffffffda3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000340)={r9, @in={{0x2, 0x4e21, @local}}, 0x6, 0xfffffffffffffffd, 0x0, 0x8, 0xa0}, 0x98) pwritev(r8, &(0x7f0000001a80)=[{&(0x7f0000001a00)="f92c41da234abbf81090d3bb3e9b97c94f2d07a01f4e515051bb7d815e23b1e160d340f1b0cdd8e84266801184aae73561f6dcecbdd3357c509ed54eefa58af1c4751e5e014d37142547ed501178100338a498d5657a4dd71f55", 0x5a}], 0x1, 0x0) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000440)={0x1, 0x40}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x200100, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') r11 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r11, 0x227a, &(0x7f0000000000)) r12 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r10, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="d8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000092fcf80bc7cf0003c9b6c403430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000c94cba45ec5799639fcefd326199e1390000000000000000000000000000000000"]) getsockopt$IP_VS_SO_GET_DAEMON(r12, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000100)=0xf) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000640)) 07:49:56 executing program 4: 07:49:56 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xbf01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:56 executing program 4: 07:49:56 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8035000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:56 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae05, &(0x7f0000000140)={0x2}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffff0000) ppoll(&(0x7f0000000000)=[{r3}], 0x1, &(0x7f00000000c0), &(0x7f0000000140), 0x8) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x6, {0x2, 0x4e21, @remote={0xac, 0x4}}, {0x2, 0x4e21, @loopback=0x7f000002}, {0x2, 0x4e20, @broadcast}, 0x22, 0x1, 0x1, 0x3, 0x0, 0x0, 0x7, 0x800, 0x200}) r5 = dup3(r2, r2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000400)={0x2, "7665746831000000000000001100"}, 0x18) r6 = memfd_create(&(0x7f0000000800)="2f7565762f6c6f6e71230070d06857100100004f8f060cced952", 0x0) r7 = dup(r5) ioctl$RTC_EPOCH_READ(r6, 0x8008700d, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000028c0)) r8 = accept4$packet(r6, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x80800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x80}, &(0x7f0000000300)=0xfffffffffffffda3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000340)={r9, @in={{0x2, 0x4e21, @local}}, 0x6, 0xfffffffffffffffd, 0x0, 0x8, 0xa0}, 0x98) pwritev(r8, &(0x7f0000001a80)=[{&(0x7f0000001a00)="f92c41da234abbf81090d3bb3e9b97c94f2d07a01f4e515051bb7d815e23b1e160d340f1b0cdd8e84266801184aae73561f6dcecbdd3357c509ed54eefa58af1c4751e5e014d37142547ed501178100338a498d5657a4dd71f55", 0x5a}], 0x1, 0x0) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000440)={0x1, 0x40}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x200100, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') r11 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r11, 0x227a, &(0x7f0000000000)) r12 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r10, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="d8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000092fcf80bc7cf0003c9b6c403430000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000c94cba45ec5799639fcefd326199e1390000000000000000000000000000000000"]) getsockopt$IP_VS_SO_GET_DAEMON(r12, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000100)=0xf) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000640)) 07:49:57 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x8035, 0x28}}}}}, &(0x7f0000000380)) 07:49:57 executing program 4: 07:49:57 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8c, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:49:57 executing program 3: 07:49:57 executing program 4: 07:49:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x1f4, 0x28}}}}}, &(0x7f0000000380)) 07:49:57 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd0000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:57 executing program 4: 07:49:57 executing program 3: 07:49:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x689, 0x28}}}}}, &(0x7f0000000380)) 07:49:57 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:57 executing program 4: 07:49:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x60, 0x28}}}}}, &(0x7f0000000380)) 07:49:57 executing program 3: 07:49:58 executing program 4: 07:49:58 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xab000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 07:49:58 executing program 3: 07:49:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x1400000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:58 executing program 3: 07:49:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x3c000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:58 executing program 4: 07:49:58 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:58 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8400, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:58 executing program 3: 07:49:58 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x1000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:58 executing program 4: 07:49:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x88640000, 0x28}}}}}, &(0x7f0000000380)) 07:49:59 executing program 3: 07:49:59 executing program 4: 07:49:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 07:49:59 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1200, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:59 executing program 3: 07:49:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xe80, 0x28}}}}}, &(0x7f0000000380)) 07:49:59 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:49:59 executing program 4: 07:49:59 executing program 3: 07:49:59 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x47, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:49:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x4000000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:49:59 executing program 3: 07:49:59 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xf0, 0x28}}}}}, &(0x7f0000000380)) 07:49:59 executing program 4: 07:50:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 07:50:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x4788, 0x28}}}}}, &(0x7f0000000380)) 07:50:00 executing program 4: 07:50:00 executing program 3: 07:50:00 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c010000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:00 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x162, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:00 executing program 4: 07:50:00 executing program 3: 07:50:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x88caffff00000000, 0x28}}}}}, &(0x7f0000000380)) 07:50:00 executing program 3: 07:50:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x89060000, 0x28}}}}}, &(0x7f0000000380)) 07:50:00 executing program 4: 07:50:00 executing program 4: 07:50:00 executing program 3: 07:50:00 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xf4010000, 0x28}}}}}, &(0x7f0000000380)) 07:50:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:01 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:01 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xae010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x86ddffff, 0x28}}}}}, &(0x7f0000000380)) 07:50:01 executing program 4: 07:50:01 executing program 3: 07:50:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285918070") socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x20}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0x53e4, 0x8004, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000020f, 0x0) 07:50:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 07:50:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x88a8ffff00000000, 0x28}}}}}, &(0x7f0000000380)) 07:50:01 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x300000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:50:01 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x79000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="008000734eee39a10000000000140003002570365f76746930000000"], 0x1}}, 0x0) 07:50:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xb00, 0x28}}}}}, &(0x7f0000000380)) 07:50:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fde000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="0f01cf660f5529660f3804180f080f0d7e0736260f5cd8f36f0f01cb2e3e660fd4d80f35", 0x24}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000580)=0x2fff) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:50:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:02 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:02 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xff00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000880)={{}, 'syz0\x00'}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000000)) 07:50:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xe0, 0x28}}}}}, &(0x7f0000000380)) [ 3260.587013] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:02 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3c010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3260.680974] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:02 executing program 3: 07:50:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:02 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x806, 0x28}}}}}, &(0x7f0000000380)) 07:50:02 executing program 3: [ 3260.910324] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x3c, 0x28}}}}}, &(0x7f0000000380)) [ 3261.107363] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:03 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:03 executing program 3: 07:50:03 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd9010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0xb00000000000000, 0x28}}}}}, &(0x7f0000000380)) 07:50:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:03 executing program 3: r0 = socket(0x20000000000000a, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000480)="0a5c2d023c1262858e8070") r1 = socket$inet(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) recvmsg(r1, &(0x7f0000000300)={&(0x7f0000000180)=@nfc_llcp, 0x80, &(0x7f0000000280), 0x0, &(0x7f0000000340)=""/41, 0x29}, 0x0) [ 3261.512458] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 3261.609174] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:50:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x7, 0x28}}}}}, &(0x7f0000000380)) 07:50:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) listen(r0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) 07:50:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:03 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd7010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:03 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x27}}}}}, &(0x7f0000000380)) [ 3261.795900] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:04 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:04 executing program 3: io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={0xfaaf}, 0x8}) r0 = accept(0xffffffffffffffff, &(0x7f0000000440)=@ethernet={0x0, @broadcast}, &(0x7f0000000300)=0x80) connect$vsock_dgram(r0, &(0x7f0000000540)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) socket$inet(0x2, 0x1, 0x4) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001640)) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x0, 0x3ff}}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f00000003c0)="303652fdf2d5fa677bb657c8a6393afafab462b873c4b059d57a74fd4c61572b476c387eda77df9210") ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000004c0)={0x7, 0x70, 0x0, 0x81, 0x100000000, 0xffffffff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x46, 0x401, 0x200, 0xcb4, 0xc00000000, 0x6, 0x80, 0x0, 0x0, 0x0, 0x101, 0x9, 0x90a, 0x80000001, 0x7, 0x6, 0x0, 0x1, 0x4, 0x2, 0x7, 0x9572, 0x10001, 0x2, 0x1ff, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000400)}, 0x4, 0x0, 0x9e, 0x6, 0x10001, 0x9, 0x43f9}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000380)=0xffffffffffff0001, 0x4) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)='/dev/dri/card#\x00', 0xf, 0x2) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000180)={0xa, 0x4}, 0xc) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000340)={0x0, 0x6}) close(r1) r4 = syz_open_dev$usbmon(&(0x7f00000012c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0x9204, 0x8001) 07:50:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8848000000000000}) 07:50:04 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa501, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xd000000}) [ 3262.463703] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:04 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x120, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:04 executing program 3: 07:50:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:04 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x2000000}) 07:50:04 executing program 3: [ 3262.670669] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:05 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:05 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x88480000}) 07:50:05 executing program 3: 07:50:05 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1e3, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:05 executing program 3: 07:50:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xffffdd86}) [ 3263.398333] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:05 executing program 3: 07:50:05 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x15e, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:05 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:05 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xd}) [ 3263.724119] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:06 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8801000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:06 executing program 3: 07:50:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x600000000000000}) 07:50:06 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:06 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:06 executing program 3: 07:50:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x3c00}) [ 3264.309584] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:06 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:06 executing program 3: [ 3264.512632] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xf4010000}) 07:50:06 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xcd010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:06 executing program 3: 07:50:06 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:06 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x600}) [ 3264.741256] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8035}) 07:50:07 executing program 3: 07:50:07 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:07 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:07 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x176, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:07 executing program 3: 07:50:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xf0}) [ 3265.270449] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:07 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x4a00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:07 executing program 3: 07:50:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x806}) [ 3265.463748] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:07 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8864}) 07:50:07 executing program 3: [ 3265.672010] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:08 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x1c, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:08 executing program 3: 07:50:08 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1801, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x689}) 07:50:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:08 executing program 3: 07:50:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x7}) [ 3266.212873] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:08 executing program 3: 07:50:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:08 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x129, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:08 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8847}) [ 3266.500246] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x800e0000}) 07:50:09 executing program 3: 07:50:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:09 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x20006080, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:09 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6e, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x3000000}) 07:50:09 executing program 3: [ 3267.090810] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb=']) 07:50:09 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7800000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:09 executing program 3: [ 3267.275229] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x28}) 07:50:09 executing program 3: 07:50:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[]) 07:50:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xd00000000000000}) [ 3267.557331] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:09 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:09 executing program 3: 07:50:09 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe400000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:09 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x81000000}) 07:50:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[]) 07:50:10 executing program 3: [ 3267.993546] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x3c000000}) 07:50:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[]) 07:50:10 executing program 3: 07:50:10 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x41000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3268.281755] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:10 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x608}) 07:50:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:10 executing program 3: 07:50:10 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf6010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) 07:50:11 executing program 3: 07:50:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x6488}) [ 3269.001962] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) 07:50:11 executing program 3: 07:50:11 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7600000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3269.210199] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:11 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xffffca88}) 07:50:11 executing program 3: 07:50:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) 07:50:11 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3a00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:11 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x60}) 07:50:11 executing program 3: [ 3269.885003] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:11 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x88caffff00000000}) 07:50:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb']) 07:50:12 executing program 3: [ 3270.118662] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x800000000000000}) 07:50:12 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1601, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:12 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:12 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:12 executing program 3: 07:50:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb']) 07:50:12 executing program 3: 07:50:12 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x43050000}) [ 3270.807083] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:12 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f7980584303d01f0549a89d78dc4af89ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5ad3657818feb0279188b92b2e6b035cde4c66c6b00081bd106f6adfe58108a8be89d3695670374e304c071de17635f3034de8c2372e07000000000000007d656f") sendfile(r1, r2, &(0x7f0000000000), 0x80000002) 07:50:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='sb']) 07:50:12 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x3c}) 07:50:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:13 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xaf01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3271.094182] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 07:50:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000140012000c0001006772657461700000040002000a0001000080c20000000000"], 0x1}}, 0x0) 07:50:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x4888}) 07:50:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:13 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xffffffff00000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6, @local}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000002dc0)={0x0, 0x1, 0x6}, 0x10) 07:50:13 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) [ 3271.672321] device veth0_to_bridge entered promiscuous mode 07:50:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xe8030000}) 07:50:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x10, 0x2, 0xf) r2 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f7980584303d01f0549a89d78dc4af89ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5ad3657818feb0279188b92b2e6b035cde4c66c6b00081bd106f6adfe58108a8be89d3695670374e304c071de17635f3034de8c2372e07000000000000007d656f") sendfile(r1, r2, &(0x7f0000000000), 0x80000002) 07:50:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) [ 3271.745329] device veth0_to_bridge left promiscuous mode 07:50:13 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xffffca88}) 07:50:13 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8000a0ffffffff}) 07:50:13 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x63000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) [ 3271.927857] sit: Src spoofed 9.0.0.0/:: -> 255.255.255.255/:: 07:50:14 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x6488}) 07:50:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8906000000000000}) 07:50:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) [ 3272.132171] sit: Src spoofed 9.0.0.0/:: -> 255.255.255.255/:: 07:50:14 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x88470000, 0x28}}}}}, &(0x7f0000000380)) 07:50:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x700}) 07:50:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:14 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xaf, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:14 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) [ 3272.605843] sit: Src spoofed 9.0.0.0/:: -> 255.255.255.255/:: 07:50:14 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x8848, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x6}) 07:50:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) [ 3272.777357] sit: Src spoofed 9.0.0.0/:: -> 255.255.255.255/:: 07:50:14 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x59000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:14 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x1400}) 07:50:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) 07:50:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000580)={0x0, 0x0, 0x2080}) listen(r2, 0x0) ioctl$TCXONC(r1, 0x540a, 0xbe5b) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:50:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xffffffffa0008000}) [ 3273.037453] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3273.038222] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3273.055786] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3273.068334] loop4: p1 p2 p3 p4 07:50:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb6000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x543}) 07:50:15 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x195, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xb}) 07:50:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)) 07:50:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xe80}) 07:50:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x157, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x88a8ffff00000000}) [ 3273.741698] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3273.795011] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3273.808965] loop4: p1 p2 p3 p4 07:50:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) 07:50:15 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xd5, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:15 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x3e8}) 07:50:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) 07:50:16 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x200000000000000}) 07:50:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) 07:50:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)) 07:50:16 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x88caffff}) 07:50:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:16 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x89060000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:16 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7d00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8000000}) 07:50:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) [ 3274.734125] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3274.781373] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3274.789769] loop4: p1 p2 p3 p4 07:50:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x6000000}) 07:50:16 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xde000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:16 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xf0ffff}) 07:50:16 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x608, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) [ 3275.330555] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3275.340392] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3275.349116] loop4: p1 p2 p3 p4 07:50:17 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 07:50:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xd00}) 07:50:17 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1c00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 07:50:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x2800000000000000}) 07:50:17 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x6000, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 07:50:17 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x4000}) 07:50:17 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7100000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3275.781003] sit: Src spoofed 9.0.0.0/:: -> 255.255.255.255/:: 07:50:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 07:50:18 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) [ 3276.391493] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 3276.402365] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 3276.410141] loop4: p1 p2 p3 p4 07:50:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x14000000}) 07:50:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 07:50:18 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xeb010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x1000000}) 07:50:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306000055aa", 0x60, 0x1a0}]) pipe(&(0x7f0000000300)={0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0/file0\x00', 0xe, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000380)={0x0, 0x10001, 0x1f, [], &(0x7f0000000340)={0x990a7c, 0x0, [], @value64}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x30000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x20) chroot(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 07:50:18 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xfd010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:18 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xb00000000000000}) 07:50:18 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x14, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:18 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc]}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) [ 3276.860561] sit: Src spoofed 9.0.0.0/:: -> 255.255.255.255/:: 07:50:19 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:19 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) [ 3277.217825] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3277.285385] minix_free_inode: bit 1 already cleared 07:50:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x86ddffff}) 07:50:19 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x78, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:19 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) [ 3277.428476] MINIX-fs: mounting unchecked file system, running fsck is recommended 07:50:19 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xf401000000000000}) [ 3277.535142] minix_free_inode: bit 1 already cleared 07:50:19 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x18c, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10}, 0x10) 07:50:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x4788}) [ 3277.717035] MINIX-fs: mounting unchecked file system, running fsck is recommended 07:50:19 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8035000000000000}) [ 3277.935247] minix_free_inode: bit 1 already cleared 07:50:20 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10}, 0x10) 07:50:20 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6700000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:20 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xf401}) 07:50:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10}, 0x10) 07:50:20 executing program 4: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x3c00000000000000}) 07:50:20 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xdf00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:20 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x800e000000000000}) [ 3278.399138] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3278.444578] minix_free_inode: bit 1 already cleared 07:50:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:50:21 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xe000}) 07:50:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:21 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:50:21 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xed00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8100000000000000}) [ 3279.097846] MINIX-fs: bad superblock or unable to read bitmaps 07:50:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x4305000000000000}) 07:50:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:50:21 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x14000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:21 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000000240), 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x400000000000000}) [ 3279.322047] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:50:21 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:21 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@quiet='quiet'}]}) 07:50:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x3}) 07:50:21 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180), 0x0, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:21 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xfe01, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) pread64(r0, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x2}) [ 3279.953019] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:50:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockname(r2, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000040)=0x80) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="020000bb57ae0a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) fanotify_init(0x47, 0x40000) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:50:22 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001a", 0x9, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xa0008000}) 07:50:22 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xf901000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3280.101590] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3280.144295] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:50:22 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd", 0xe, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) [ 3280.347422] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:50:22 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8701000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xe000000000000000}) 07:50:22 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c9", 0x10, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:22 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/40, 0x28, 0x0) [ 3280.826177] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:50:22 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x100000000000000}) 07:50:22 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f", 0x11, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockname(r2, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000040)=0x80) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="020000bb57ae0a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) fanotify_init(0x47, 0x40000) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:50:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x28000000}) 07:50:23 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x7010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3281.055856] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 3281.061547] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:50:23 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x20, 0x0) 07:50:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xb000000}) 07:50:23 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3c00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x7000000}) [ 3281.266754] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 07:50:23 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="600084e802000a001ad56f9e99dd44c98f13", 0x12, 0x400}], 0x0, 0x0) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x0, 0x0) [ 3281.517421] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 3281.625356] minix_free_inode: bit 1 already cleared 07:50:23 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x1f4}) 07:50:23 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1a5, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:23 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast=0x2000000}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockname(r2, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000040)=0x80) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="020000bb57ae0a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) fanotify_init(0x47, 0x40000) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r3, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:50:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:23 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x86ddffff00000000}) 07:50:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:50:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x89060000}) 07:50:24 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x500000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) [ 3281.965262] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:50:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xf0ffffffffffff}) 07:50:24 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x2f00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:24 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8060000}) 07:50:24 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe800000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/40, 0x28, 0x0) 07:50:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockname(r2, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000040)=0x80) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="020000bb57ae0a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) fanotify_init(0x47, 0x40000) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) 07:50:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8100}) 07:50:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:50:24 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa901, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:24 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xfffffffffffff000}) 07:50:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockname(r2, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000040)=0x80) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="020000bb57ae0a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) fanotify_init(0x47, 0x40000) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 07:50:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x60000000}) 07:50:25 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x8e00, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockname(r2, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000040)=0x80) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="020000bb57ae0a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) fanotify_init(0x47, 0x40000) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) 07:50:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8864000000000000}) 07:50:25 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:25 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xdf, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x88640000}) 07:50:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockname(r2, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000040)=0x80) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="020000bb57ae0a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) fanotify_init(0x47, 0x40000) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) 07:50:25 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:25 executing program 1: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:50:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockname(r2, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000040)=0x80) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="020000bb57ae0a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) fanotify_init(0x47, 0x40000) 07:50:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xffffa888}) 07:50:25 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x6f01000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8848}) [ 3283.826780] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:50:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) getsockname(r1, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000040)=0x80) fanotify_init(0x47, 0x40000) 07:50:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x14}) 07:50:26 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:26 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) fanotify_init(0x47, 0x40000) 07:50:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x300000000000000}) 07:50:26 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xe0010000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:26 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xe0000000}) 07:50:26 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fanotify_init(0x47, 0x40000) 07:50:26 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x3100, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:26 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:26 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xe803}) 07:50:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)="73797374656d2e706f731d785f61636c5f61636365737300", &(0x7f00000001c0), 0x24, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:50:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_init(0x47, 0x40000) 07:50:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x8906}) 07:50:27 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:27 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:27 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa401, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x40000000}) 07:50:27 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 07:50:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fanotify_init(0x47, 0x40000) 07:50:27 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xb400, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:27 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x4000000}) 07:50:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) fanotify_init(0x47, 0x40000) 07:50:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x300}) 07:50:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) 07:50:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) fanotify_init(0x47, 0x40000) 07:50:28 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 07:50:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r2, r0, 0x8000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23, 0x7}, 0x1c) flock(r1, 0x2) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x2, 0x160, [0x200004c0, 0x0, 0x0, 0x200005c0, 0x200005f0], 0x0, &(0x7f0000000000), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x1000000b, 0x0, 0x0, 'e_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [], @dev, [], 0xa0, 0xa0, 0xd0, [@m802_3={'802_3\x00', 0x8}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1d8) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) 07:50:28 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0xa7, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x3580}) 07:50:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) fanotify_init(0x47, 0x40000) 07:50:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xe803000000000000}) [ 3286.360584] kernel msg: ebtables bug: please report to author: Total nentries is wrong 07:50:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000000880), 0x1000) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0xfd0}, 0x28, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) [ 3286.435423] ================================================================== [ 3286.443175] BUG: KASAN: stack-out-of-bounds in locks_remove_flock+0x33c/0x350 [ 3286.450464] Read of size 8 at addr ffff8801be077a08 by task syz-executor4/24847 [ 3286.457911] [ 3286.459555] CPU: 0 PID: 24847 Comm: syz-executor4 Not tainted 4.20.0-rc1-next-20181107+ #107 [ 3286.468135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3286.477495] Call Trace: [ 3286.480095] dump_stack+0x244/0x39d [ 3286.483744] ? dump_stack_print_info.cold.1+0x20/0x20 [ 3286.488949] ? printk+0xa7/0xcf [ 3286.492249] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 3286.497026] print_address_description.cold.7+0x9/0x1ff [ 3286.502393] kasan_report.cold.8+0x242/0x309 [ 3286.506818] ? locks_remove_flock+0x33c/0x350 [ 3286.511343] __asan_report_load8_noabort+0x14/0x20 [ 3286.516294] locks_remove_flock+0x33c/0x350 [ 3286.520659] ? flock_lock_inode+0x11c0/0x11c0 [ 3286.525181] ? mark_held_locks+0x130/0x130 [ 3286.529434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 07:50:28 executing program 2: clone(0x0, &(0x7f0000000240), &(0x7f0000000100), &(0x7f0000000500), &(0x7f0000000480)) waitid(0x1b00000000000000, 0x0, &(0x7f0000002ff0), 0x4100000c, &(0x7f0000000140)) 07:50:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0xf000}) 07:50:28 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fanotify_init(0x47, 0x40000) [ 3286.534978] ? __call_rcu.constprop.55+0x3ea/0x950 [ 3286.539920] ? __call_rcu.constprop.55+0x3ea/0x950 [ 3286.544863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3286.550419] ? debug_smp_processor_id+0x1c/0x20 [ 3286.555102] ? perf_trace_lock+0x14d/0x7a0 [ 3286.559350] ? locks_remove_posix+0x486/0x850 [ 3286.563865] ? lock_is_held_type+0x210/0x210 [ 3286.563894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3286.563918] locks_remove_file+0x148/0x5c0 [ 3286.563936] ? fcntl_setlk+0xfc0/0xfc0 [ 3286.573887] ? fsnotify_first_mark+0x350/0x350 [ 3286.573904] ? __fsnotify_parent+0xcc/0x420 [ 3286.573921] ? perf_trace_sched_process_exec+0x860/0x860 [ 3286.573939] ? fsnotify+0xf20/0xf20 [ 3286.573961] ? __might_sleep+0x95/0x190 [ 3286.603996] __fput+0x2f0/0xa70 [ 3286.607300] ? get_max_files+0x20/0x20 [ 3286.611214] ? trace_hardirqs_on+0xbd/0x310 [ 3286.615554] ? kasan_check_read+0x11/0x20 [ 3286.619717] ? task_work_run+0x1af/0x2a0 [ 3286.623794] ? trace_hardirqs_off_caller+0x300/0x300 [ 3286.628913] ? filp_close+0x1cd/0x250 [ 3286.632735] ____fput+0x15/0x20 07:50:28 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty=[0x74000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9000000, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)={0x806000000000000}) [ 3286.636025] task_work_run+0x1e8/0x2a0 [ 3286.639932] ? task_work_cancel+0x240/0x240 [ 3286.644273] ? copy_fd_bitmaps+0x210/0x210 [ 3286.648522] ? do_syscall_64+0x9a/0x820 [ 3286.652522] exit_to_usermode_loop+0x318/0x380 [ 3286.657120] ? __bpf_trace_sys_exit+0x30/0x30 [ 3286.661652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3286.667211] do_syscall_64+0x6be/0x820 [ 3286.671115] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3286.676496] ? syscall_return_slowpath+0x5e0/0x5e0 [ 3286.681438] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3286.686296] ? trace_hardirqs_on_caller+0x310/0x310 [ 3286.691332] ? prepare_exit_to_usermode+0x291/0x3b0 [ 3286.696375] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3286.701246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3286.706441] RIP: 0033:0x411021 [ 3286.709662] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3286.728571] RSP: 002b:00007ffe81642990 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 07:50:28 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fanotify_init(0x47, 0x40000) [ 3286.736289] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000411021 [ 3286.743565] RDX: 0000000000000000 RSI: 0000000000731b30 RDI: 0000000000000004 [ 3286.750843] RBP: 0000000000000000 R08: 00000000815293bf R09: 0000000000000000 [ 3286.758125] R10: 00007ffe816428c0 R11: 0000000000000293 R12: 0000000000000000 [ 3286.765400] R13: 0000000000000001 R14: 0000000000001f9a R15: 0000000000000004 [ 3286.772698] [ 3286.774329] The buggy address belongs to the page: [ 3286.779267] page:ffffea0006f81dc0 count:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 3286.787415] flags: 0x2fffc0000000000() [ 3286.791317] raw: 02fffc0000000000 0000000000000000 ffffffff00000101 0000000000000000 [ 3286.799208] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 3286.807085] page dumped because: kasan: bad access detected [ 3286.812796] [ 3286.814428] Memory state around the buggy address: [ 3286.819364] ffff8801be077900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3286.826732] ffff8801be077980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3286.834103] >ffff8801be077a00: f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3286.841462] ^ [ 3286.845096] ffff8801be077a80: 00 f1 f1 f1 f1 00 00 f2 f2 f2 f2 f2 f2 f8 f2 f2 [ 3286.852464] ffff8801be077b00: f2 f2 f2 f2 f2 00 f2 f2 f2 00 00 00 00 00 00 00 [ 3286.859827] ================================================================== [ 3286.867183] Disabling lock debugging due to kernel taint [ 3286.879365] Kernel panic - not syncing: panic_on_warn set ... [ 3286.885276] CPU: 0 PID: 24847 Comm: syz-executor4 Tainted: G B 4.20.0-rc1-next-20181107+ #107 [ 3286.895241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3286.904598] Call Trace: [ 3286.907215] dump_stack+0x244/0x39d [ 3286.910854] ? dump_stack_print_info.cold.1+0x20/0x20 [ 3286.916063] panic+0x2ad/0x55c [ 3286.919280] ? add_taint.cold.5+0x16/0x16 [ 3286.923418] ? preempt_schedule+0x4d/0x60 [ 3286.927563] ? ___preempt_schedule+0x16/0x18 [ 3286.931986] ? trace_hardirqs_on+0xb4/0x310 [ 3286.936314] kasan_end_report+0x47/0x4f [ 3286.940275] kasan_report.cold.8+0x76/0x309 [ 3286.944585] ? locks_remove_flock+0x33c/0x350 [ 3286.949244] __asan_report_load8_noabort+0x14/0x20 [ 3286.954161] locks_remove_flock+0x33c/0x350 [ 3286.958473] ? flock_lock_inode+0x11c0/0x11c0 [ 3286.962956] ? mark_held_locks+0x130/0x130 [ 3286.967179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3286.972704] ? __call_rcu.constprop.55+0x3ea/0x950 [ 3286.977618] ? __call_rcu.constprop.55+0x3ea/0x950 [ 3286.982565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3286.988095] ? debug_smp_processor_id+0x1c/0x20 [ 3286.992754] ? perf_trace_lock+0x14d/0x7a0 [ 3286.996982] ? locks_remove_posix+0x486/0x850 [ 3287.001496] ? lock_is_held_type+0x210/0x210 [ 3287.005917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3287.011467] locks_remove_file+0x148/0x5c0 [ 3287.015726] ? fcntl_setlk+0xfc0/0xfc0 [ 3287.019617] ? fsnotify_first_mark+0x350/0x350 [ 3287.024203] ? __fsnotify_parent+0xcc/0x420 [ 3287.028510] ? perf_trace_sched_process_exec+0x860/0x860 [ 3287.033947] ? fsnotify+0xf20/0xf20 [ 3287.037563] ? __might_sleep+0x95/0x190 [ 3287.041534] __fput+0x2f0/0xa70 [ 3287.044820] ? get_max_files+0x20/0x20 [ 3287.048704] ? trace_hardirqs_on+0xbd/0x310 [ 3287.053021] ? kasan_check_read+0x11/0x20 [ 3287.057171] ? task_work_run+0x1af/0x2a0 [ 3287.061218] ? trace_hardirqs_off_caller+0x300/0x300 [ 3287.066310] ? filp_close+0x1cd/0x250 [ 3287.070100] ____fput+0x15/0x20 [ 3287.073373] task_work_run+0x1e8/0x2a0 [ 3287.077249] ? task_work_cancel+0x240/0x240 [ 3287.081574] ? copy_fd_bitmaps+0x210/0x210 [ 3287.085796] ? do_syscall_64+0x9a/0x820 [ 3287.089757] exit_to_usermode_loop+0x318/0x380 [ 3287.094326] ? __bpf_trace_sys_exit+0x30/0x30 [ 3287.098814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3287.104341] do_syscall_64+0x6be/0x820 [ 3287.108218] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 3287.113588] ? syscall_return_slowpath+0x5e0/0x5e0 [ 3287.118541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3287.123378] ? trace_hardirqs_on_caller+0x310/0x310 [ 3287.128397] ? prepare_exit_to_usermode+0x291/0x3b0 [ 3287.133414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3287.138261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3287.143448] RIP: 0033:0x411021 [ 3287.146641] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3287.165564] RSP: 002b:00007ffe81642990 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 3287.173276] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000411021 [ 3287.180546] RDX: 0000000000000000 RSI: 0000000000731b30 RDI: 0000000000000004 [ 3287.187798] RBP: 0000000000000000 R08: 00000000815293bf R09: 0000000000000000 [ 3287.195050] R10: 00007ffe816428c0 R11: 0000000000000293 R12: 0000000000000000 [ 3287.202306] R13: 0000000000000001 R14: 0000000000001f9a R15: 0000000000000004 [ 3287.210735] Kernel Offset: disabled [ 3287.214363] Rebooting in 86400 seconds..