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", 0x1000}], 0x3, &(0x7f0000009280)=[{0xa8, 0x118, 0x8, "ba32f5cebf6d0eb136634304f8b69da15c0a18265ad802fc0750072d2b9a61146dedc7b93a4765ab0ea955ff1c02021c8828d2bff9eea7c54f2234e263c7cc84e6296466354d09f970bef82416e23308b715701e72d054b04a199655ca2ac5ff9b771e17fffc9ac7a7fdf61744bc48e246122c5b4d0088394a133063974767234d997273d4b17c88887ca4bf2ed96d2b2337"}], 0xa8, 0x40}, 0x1}, {{&(0x7f0000009340)=@rc={0x1f, {0x7, 0x3, 0x80000000, 0x7, 0x7, 0xe8}}, 0x80, &(0x7f00000095c0)=[{&(0x7f00000093c0)="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", 0xfc}, {&(0x7f00000094c0)="e6309ed88bd6d7963d62981ae45a1400d3a07dc27a40458db59f5b3bff715319021339a1bf10925441df60f47d6a1d7402e541f66bf305b95119e372fe0eaa3c8b2d34bf355a7b41a7fe9cce01374bf8124bee66f3c5440a367277d966f4910f382c708e45d2b3fe4b1fe617fae416d00e81a29f05bf69d6be441776ef8627790db470bbbfbd826c310db2e609552ed413e1f88440eeed3c1b1e571788e4c648e9f1ba5f9a181e2dd26db8b1573da5f1a117518714443d6bf5d4acdfd287ef96e642e5ab1e93ed2d6097ac889319595003c6583cc91941087ffefea941b07c761f6adb5afc2f7ea10382c0e2f84bca8f03e131927df5789744", 0xf9}], 0x2, &(0x7f0000009600)=[{0x98, 0x11f, 0x13a3, "514a2e46e7b8d8239f063a2e85cabb687ecc88d4851c064af6e404bb8f0c875f3759b8b2fa2e3d75886d92d5fd6c155c08adc0b3190af79f580d63974e94d146225bd31376d95df93730a03cc45f33626c7c4791a0c2c9fc4ec5934307779ccb6234e3d9427d9a6f3830d4df35c0d5024326ece3a92f456bb9216d08dffd7de68154"}, {0xb0, 0x10b, 0xffff, "e8506b0a28df605d405280d370c9b456e039d96c02b1a5fe261b6c484f9bdc2c455ea58fe754c52dec48ee801d138c94e8f0eef5a6876e7879717ec3bec00ccf542c3e3c9775f9d4a43cbbb268b91705ccaf79bbdaff22cece9036250a35bc127cf270c39208df8def26c8bbbfb2e20fe1303aa03278c8dab6b75b8182e127a29db9e5135b22dfbd61afe549bb3d6c53df51d37868e95a36108d8cc7e38590"}, {0x1010, 0x112, 0x1ffc0, "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"}, {0x58, 0x0, 0x4c9, "bf3dd1782725d0816e9d4f5da2417793fccf0ea0ee0308e1b2784cc5129d40595ed2abcd96ea2772a334b31d0b429908b4a2cf79e32c4001ee5f50675184486d17b24006"}], 0x11b0}, 0x6}], 0xa, 0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xfffffffffffffc5d) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)) r6 = getpgid(r5) r7 = syz_open_procfs(r6, &(0x7f0000000000)='net/nfsfs\x00') preadv(r7, &(0x7f00000017c0), 0x1d0, 0x0) sendto$inet(r2, &(0x7f0000000100)="94f65a920e7f77eafbfa21acbeccae632b9920171be08d307d7e4cdaf63c99ed495528d22a9f013e21986688b51d152fb0804b13300e5c0565bf577fcf8cf9c68b7a3635f46f87ce055639d76c74819c13f4bb537fc3", 0x56, 0x20004810, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) pkey_free(0xffffffffffffffff) 06:40:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x46, 0x0) 06:40:30 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) dup2(0xffffffffffffffff, r2) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 768.820896] hfs: unable to load iocharset "c+862" [ 768.825891] hfs: unable to parse mount options [ 768.913036] hfs: unable to load iocharset "c+862" [ 768.918008] hfs: unable to parse mount options 06:40:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x2000000]}}, 0x1c) 06:40:31 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x19, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:31 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) r2 = socket$inet6(0xa, 0x800, 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000007c0)={0x0, 0x3}, &(0x7f0000000800)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000840)={r3, 0x3ff, 0x83, "32d4acc94efa7424c821d2847998244a60d8217859101e5acdf913af99f17ad0ef4168473430ebc7a7dba8766889c92a55843273fd0dcb00ddd660059b095664c444b9ec22bc78137703e7c4766eae5267f3f2002b2a1ad7a9e20c8e83798d3e7500951d43adae1ed935cba883b76172854f8a97fe535104739437537189bbdffa7536"}, 0x8b) r4 = socket$kcm(0xa, 0x5, 0x11) r5 = syz_open_dev$sndpcmc(&(0x7f0000000a80)='/dev/snd/pcmC#D#c\x00', 0x2, 0x2000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000ac0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000b40)={0x7, 0x8, 0xfa00, {r6, 0x80000000}}, 0x10) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r7, 0x50, &(0x7f0000000080)}, 0x10) ioctl$BINDER_GET_NODE_DEBUG_INFO(r7, 0xc018620b, &(0x7f0000000900)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r7, 0xc018620b, &(0x7f0000000a40)={r8}) io_setup(0xf3, &(0x7f0000000240)=0x0) io_submit(r9, 0x6, &(0x7f0000000740)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x271, r1, &(0x7f0000000280)="0d82cfbc02b97b2697dc872c48c20b7edeec4ba36227698ea7763959ef7509ea4afa1c25c9de9641b7adbd3834ed69d255eb25328e73ed7cfa6e722aefd5c0d22583ea4f422a44a7a228ad4e8d3047194e19c96c57480c7c026f9ce89fdd38cb8abe8fc1f27cee4ee853dd978e7fa41ee7b96daa4aa2b04cafaaef759980fc6b2e12ac011ee2821811f8b426b2551b9a1d95bd25f707716b8c690b28ada18addd4ae62268fb6c0db6b", 0xa9, 0x5, 0x0, 0x3, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0xffff, r0, &(0x7f0000000380)="3494c4f83dc00ae045fc2758276e479f9e14ffabf021d0d16c9fc3b7cb50e2ee730572dd3f6690", 0x27, 0xdb, 0x0, 0x0, r7}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x3ff, r0, &(0x7f0000000400)="1cea3a029b597f609cdbf53fed9e98e28789b3651312c248295721588af4c867e1ae11cd80cd34ce2273a686fd17ef15141a2e3236393022ad7be9d143374376251cfd3ff26c9fc7273f97d21e284a3f105771c0fe8043c270e6", 0x5a, 0x9, 0x0, 0x0, r7}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0xa, 0x15aca87e, 0xffffffffffffffff, &(0x7f00000004c0)="09af7878b3df255a416ac9afb750b2b0dbccfc0438be7c141a6bf7aecb92971431bb56dadfa65b06741a9ff1e5101cd888e8b6ec5a1d13c3a3d88c94953d4169cff422a056ec7a127ea6a36e2e66a429370284155b0f38033462f207c2bca7b16db3ce3c80ab2093a72eb74de8accbccb63bb27ec7abe1c9c1f79c91c7aee5df2d598a062e494a5946932f73797f33233319f92d814cdd90661770dd0562362ffa2d2471ae65db8aaabc6327de4b2f9b8ed005dce3004e0d0cc3c2f077c051", 0xbf, 0x5, 0x0, 0x0, r7}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x8, 0x3, r0, &(0x7f00000005c0)="e376804fb3ceb8ceab19edf54dadbae02116954170ae0711e476df3fd643fd35bdbdb43ae046f191e7a261cc", 0x2c, 0x9, 0x0, 0x2, r7}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0xa, 0x5, 0xffffffffffffffff, &(0x7f0000000640)="c33889215806adaaa4c23283f395f4bfbed99f7dc6222b99029b040d895c24d5f8c3a7e94288b2773ab24fa0a1c5d4c23d8cc424c9203f74f0a1c51a60b0d5eccfdb711ece412474aaa86c1f1cb37fa3abc322ed4ea4aaa4d35ad9d41226c6cb77fe97597214128525b188310e656dc8c33871bcf32d145ff554da734cd706b584ddb05358ffcb9ac33465312b6d982f6899bb8a962b1cbdd1ab6596ca8ec09053ce1d", 0xa3, 0x80000000, 0x0, 0x2, r7}]) setsockopt$sock_attach_bpf(r4, 0x29, 0x1b, &(0x7f0000000040)=r4, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) getsockopt$inet_udp_int(r7, 0x11, 0x6f, &(0x7f0000000140), &(0x7f0000000200)=0x4) 06:40:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x2a0000) getpeername$packet(r0, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000014c0)=0x14) sendmsg$xdp(r2, &(0x7f0000001640)={&(0x7f0000001500)={0x2c, 0x4, r3, 0x3c}, 0x10, &(0x7f0000001600)=[{&(0x7f0000001540)="70f1797e2d76a10188222953697c4f043477daa1e2ab71a36d650f2fca4acb2a726e1494c66406d7d230ea35534fb5d2ebd43c0f599879366f86ac420b107c9c3f22804251f6c79fd44da625720ce229eaeb37ac461bad4c5e062c6b91048ccd350e6fdae8f6ce614f91b3e8a5189baffdce41eb1a97168e67430bf574e6601433188e30675f1e4377c92da83dd9cc05f5bf454922f847ec00b0e81da65653bd7040ff13346abd52e58a22c7790d7ae97577afc13f10", 0xb6}], 0x1, 0x0, 0x0, 0x4}, 0x1) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) 06:40:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x18f, 0x0) 06:40:31 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:31 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'c#862'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:31 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1af, 0x0) [ 769.183786] attempt to access beyond end of device [ 769.188895] loop3: rw=4096, want=136, limit=5 [ 769.193470] gfs2: error 10 reading superblock 06:40:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x55, 0x0) 06:40:31 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 769.259730] hfs: unable to load iocharset "c#862" [ 769.264729] hfs: unable to parse mount options [ 769.299470] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x202, 0x0) [ 769.367733] hfs: unable to load iocharset "c#862" [ 769.372683] hfs: unable to parse mount options [ 769.381592] attempt to access beyond end of device [ 769.386619] loop3: rw=4096, want=136, limit=5 [ 769.391196] gfs2: error 10 reading superblock 06:40:31 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:31 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xc, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:31 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cx862'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 769.542816] attempt to access beyond end of device [ 769.547873] loop3: rw=4096, want=136, limit=5 [ 769.552441] gfs2: error 10 reading superblock 06:40:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1c8, 0x0) [ 769.614774] attempt to access beyond end of device [ 769.619853] loop3: rw=4096, want=136, limit=5 [ 769.624533] gfs2: error 10 reading superblock [ 769.657194] hfs: unable to load iocharset "cx862" [ 769.662126] hfs: unable to parse mount options [ 769.738905] hfs: unable to load iocharset "cx862" [ 769.743862] hfs: unable to parse mount options 06:40:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xac050000]}}, 0x1c) 06:40:32 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x8001, 0x4, 0x46}, 0x10) 06:40:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x109000, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1192) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:32 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xeb09, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:32 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'c-862'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x227, 0x0) 06:40:32 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xda, 0x0) 06:40:32 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:32 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x8, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:32 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:32 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcs\x00', 0x20200, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000640)) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) accept$nfc_llcp(r2, &(0x7f00000000c0), &(0x7f0000000140)=0x60) r3 = socket$kcm(0xa, 0x2, 0x11) ioctl$VT_ACTIVATE(r2, 0x5606, 0xd60) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) sendmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f0000000200)=@in6={0xa, 0x4e23, 0x9, @remote, 0x1}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)="8d2d6f6bbc4182cb8cfd343cc185d5f80888f6114b2838a61da0d05d3203fef7f89cc0ab1e089e8189dbde71642bb3cd6184784568bb4ea6ba336aa2cb801fed8e7d9b99e9e95f52a3e57f79b1868e71ac59fdd0a93a02b32ceb76b2f45f52a0561e8da24fef5b2611df9698204d1b2e4bc6845c4b21f32f390715c622696a022601ade0", 0x84}, {&(0x7f0000000340)="ca74df49f609ebd4891624a9a8f7b97b95da14a4b6846cb5d8705e06c26cf7aaf28d7f0d9a7656b855110e4a9a581d5679b048d68aecd59d83b2a3f2", 0x3c}, {&(0x7f0000000380)="37df54d36858980ae054bdcbf09af335d50120e7e9c2e1d9b061236a7881321b72e8cd42cd93a7391681885c499e2339ec2652e280f73fa1d4a15e3feeafeb5139e8c5c5599e8111fde52d0495f934e79607fe00fb4208c263ab580d24ff68afed7d5f0ac38dd6457a02debc132f5a707092748a07098c3cd496d9f008f1d3a6304f3cd7771851ea5a54b8360153fb5b6fafdd3be4d2cbb5f923a800ca868c893577ea878275a362fbcb8b0a79ee578ef0848d479272ab4ce9cbe453a27b8628bce726eb31d1cbaf4612b1f10f2521dae1fdd643e863655ee4ade33c0bc1bd5c41bc67b9", 0xe4}], 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="10100000000000000a01000003000000f3770200eed285963c1012aa22fad09429492f81166581a225987a0e1cc12da4584a8e87a8edfbf5b36ccefd29ee8af2e4cee705c1efe1efbb4ed79108528b6dc08a60c6e29839d4e185956bac7e34001294ef33f79701e368dcc81d358ecd4898a979e1db469d18f292b62329b7631f2881cda1230061b83920c18f56bc3f7bd065fbf93dd8db36fb53d2e3bb03bba8a1d9b95aab4d10338765eb9761893c7a02ae73aa6ec16e5b6ee88228a2be957e26fcac1177a558a0ae02ab9f1216afc52f5218bae5b479a259f4684cb697f6f61079606bb9f69d5f1a4a4f5c990a36d5ce761a908efc51eb9cd48f4d8af80f802d84e355bc9aeaf3d09106e10db4fbc00f6ea8de6ba48986b2f22b283d004d2046045798990e20a0c587d796076d1cc3c46251444838ceeba44c9a27ee73416a6ecd2ad87db2d8cf7fca9178a520a80587bfe38cbb455c97c82baddd54744936604e096d6159eef12af394e005059b8a79c2dcc5bee46d9f671a80bb6166720428ed7de13973507e6daf5da7bd1ced38204969b76304d9111a5d8b391088d8b1639ea8c98ce411f2b783b01b81de3da8cef4bb3a52ebefe4d4e6a4da474cdb7662c873cc49f0d26b409bec1721d7a52c8524fda7548067bc4b0610cf9f7ac69c428f5cdc47bbfaf4a537b17c7b1007668885036775453372f5f33b574e6cb067240a4e91a8dfe7ac40540b91a186547f2f0bbfc7288850e4167991d167993e3038f9f62a540f0685523efca416948f3da4d34ce90b455a096ba9db79128d95d8aaea4e821614e714fd553da94d104e23684410133ce310bc7d62079c39637deac2ef7892b6f058f8a463c65e3b18943cad634ef840e6ef2b023c9db6dbd699c5d4a844f22b3f869237e1289d7c8f0bcb4fb77425cf356904eb3bac8795480fd206084f2aa745f4945ff1ef948b9cf6983bc3658a61c6b9f3774def5c99b5df4f3cbe27b2d154cf57c19d03d96814957420dba94e12e709c4fdf7be15ce84f6ceae53c620a7b538a1dc0d96668cdef597023e8899b423f1f547771b6d7f37b8a94041e0afb58579bad7e08b9ce18be7b31597b5bd53163a5594c27dad4f36047b7cdc1c376d8128fee6c218a4e8175f6e8350b4dbdfcdb16079bb8ab33c0d8ba0b7043f06e0a8a47554bb0674844963644fc57bdc7f68ff83e98ca3c8a25c917ca84c9acdad27d6e14e8343145135238c586acde4363f760aebd08b045e8938db4105fce8066086b4b2d9d3a424f7995e2825ed8c2af92a2aded1091710bdf979997a8ff2d7a804e8cf7db451a73d4d96923bb695f47f623e8e808d7bea940b7003dcbdc00dcf4308d4d256e74431c6e350b8e3e60c2ef561354058121884e6973ff3367241586540db19bd619dbde2c2636576735a9e7c32bcbd1718170a2a2581c653fe6846a7ef658f5935aa08157ec616a979f7929c4cbcdf879dfb7b329aa46a4da17cbbd3e9bd01497b8864fead25827bf081d99e84f4628aa0798371b8d43d7405f692b71eaeb3a1fedf2cfc96d9c256982b3706c343731325bb6cb54b131b99698f1255e134b0876f9d5724bc661440d8f41d444ef7dcc1876713c355fe0bed5adf55abae8f655b864e9422f33dc5c948e874a199eec7ddae8eee072d616af25e8d52e532bacf444976a803a0120e27801b7b56285ee162beaa8dccd5e865814bd61aedb5252710860b7c4bfbc8fb8120876b0a5b9d1180ba353d72add37bba2084c309cbfbfa1401560aaf251dd12b189adfd5f54ba76874d6c38c182b6851b11fe133c4418fc4206742b16f1a152644edfcd243e5fdca1d9b3569dc38b98df768542c522b0c1b45c5ae4d866afb2beba55623e77f31212424d776e5b6e97f72af97a8237bc311dd669a2b26f0761a819b5d1f951445b6e08679e11f88cf0aceb399b73e7bedb354056a213ac4cef27af42cf4e0c8e8c61f245baa3bf7bca80255a26d7b5372589da49f81447efcf2b072843dc20dfee8ac3a2973efa59d3f84d39bb0ae248e7ee2ee94ceb0d1d6bfad6402d72e951f1e0ac453286ba096f8b424e31eb3b9da89ae59773bf3accab3058eeb6b23d8b2807a54efb38b71d3e751ab8bca9494795385b61e44d234872e93f429e700645a223aefe235a95048affd21b2ef93eec540e304c99b351c1437ce6571897112d821aeb572b3b54cd7d633143005a7153ce40f4e6219ba941ba09a255db66193831e34c9ab458c7aa06e6d440a96ff013d92bfe20799da4b2c5cd9112bc965e193db28e890bfacec437482c8424c84246e7b60e89cf8a7363149026050e5731d038aafd03805c5a4126f6e35c815b1e211644e832309cfbd73ad2adcf42662dedd12d12115575681f201e94229a3ec76affcc8d936c04db1fc366abbda5ef42237b3394ea3e0e1cb6b3f4ec0b9e30bdf1d8ebc62e8108e80e06eecd26831158f7b61f1c21ccd39fe9a24935b3a9afb883438ce0e76e3f1503b1ccfc64d25b85b7228e273bd4ba63d26e5bbe6d95ca2d0a9a399e2f38347b777c9ca7878da4e745184ea70d09f849a9e600ee85327ae98225e2c2b006d7cb1cef75d9e1e8ca3b996f61a4cc00fec354e3c255d2e29b25ca785743e79d0635da5b9084c19ffe2a669b269826e1fc5429dde7cbb44f00bf4a6b3426b9a00d9c21288617e9a863282ee8b169652783061c428b2568da3108039484f5e1dbe6fc1d0fe14c459b095e303368925fa09c0b93ce65cc18517a225efbb786b4c3b48cc9c749d4662bfb7312c8f8342ba56481cbbcbe9037218dae2d68cb9a470dea5b0bde6347ab59aacf4a53cb3180d24074b29e3c48e3fe38588e818069043604c36f14a971799fda7f971e073f88266898f8fbff06a77fc4946d9541677426e1d7cfcd44abdbd08f1c1efb368ed0a5e23ddaf2cedae972b9429fdffdd62acc34b4e4da4eef95477ff61189cb31bdf8bdf50981fa3e969b2211c0c1bad399093447464e1304e442e8d0c7fe17457732220ac0da2dbbb3caceea8e74cb6321ea43cd97a6b44ee45b502e3155468b51f4f4cb198469c9284429c6e67fdd978af0c0c4c025e4d100def36939e6d12fba4aa39102f3d421f5b59b1d276c31890bfd555ed1516f7888beaf8350018a4092bf9278c401e3cdf93e6e326ac8d781f3a628d7965bd2b3ae8e636dd6c865cf1a93682b81f2c1bfc90667cbe58f4c0d621dce17bf853bfb8b5a2c2629aba3a1be899e23e37db8dc1ba857457f63ab9aab8cf1786c5fa7bcac86c1f81fa13a3ba57243989bc4a9504a1c9e70f4fab1551fe99df034c9cff56e0adbb0f8beec1f930e6c2e673e1ff29934fff3499e7ab29ffd0db1a6c67e6f10e210e9344ee8f6a8536d06b591fc80aaae6ff37b019c467dabbd99875d81b53968a203f2cd2bd87d1a23eda3988549815f44e2542418069229c001aa9f6e5bb1e27fb3265814a9a889c425a8827bb7b39bf4bdd1813ac8bcb0708dec9388a5b1f3dff1b84df4687b08417f2cb92d23c7896de9ee943843e0905bb3a15a29dd766c568d1b1c323ca986bc351a21814b9ddf9676f25bce47ab018f753b633f075ac254a80f5e11abbdfe1961d61541545d058c7b11e1326875631667eb3d522ef8072b7a0e7797c740100ecd351affeeee3a34ef50db3b81498fdd4f76ff1c54a9e4dbe8d4b02c3227506e408e6102b3f3a6535a328917f055a7c1cb4300af898263b4971140cdf2e8f885f6bda5dd25ded5767e7e85b66d2d8a3b3cd3fa3dd86129ca7eeea1807cfc6fd9989c56386b27f2ab31e3f0a346a4b1cf08c7e2881a80f155567c2f55d5ff402ec993a4cdf4e6e4044074e12bbda2dcc10a63cb97600aac7cbcbbf8d6b20adecb31580a4f4c6070de6e7683b11642bec5d915d108017f27b7af4f352f9a38e56b65481b23421190234cfcf8b3bd3d6a4b8c6afef2821a8138c05dd38b88824e9282790f9534bce5df8c0440d72d99034ceab3358dda02fc98dc8c9c21d51807ebea69df0b4b5d56398642e5f99b7d68e7a52917de9e7d51980bb7b69a4614a1bb6f4238bee56b11b0c16810cd8e5ff5681dd5ba6c9e1e1fcc7d05d62ac689f3dbb548fbecbb31e9b923fabceb797fea70e246656279bca0dd962fb8c16bdf6122c7018d5a87e4ffaabf79900690569a501e525c4b966603b393f0c000365500d02636d7e5215f80f49ef4e6e1f5c2fd01d5900213eed6f7cd388f6dd7d4011fe376ac605c321e7a9fe7ce484f445db878529ee9bf88a51284d12b926c2e2066ac7971ab1a9950c40a0bc3674bb1c408f715f4a666d534915349a511925c46f18ff41ed6b6b61e0f4f1a5198ac383902dc7f1601b547289ce797c9f8a95235da8279a3d059455370e68770c4d0126563cb9d3493bc81a7a3e354a27522931229adf1c6aa636c6e03c89a67760e3547a416e6d2714019a7cfb9c01f89bc7b8c69573e23171ec9a39a8ade6e383e9039905bc6e29b1ad4b25d53b7ab92842b898eb7b5fd364440b3e1802e615b3a0aebbcb0a9c61de1f46cc0d87f7f95d22de0b4dade8f65103f4cc95de61d08c065ee16dc2336e6616795041815efb2d9caee58f3cf8b6d27f2c45d764bce45caf56e3c5cb770ea38bd6bd8f97e894eb53ba4375104a8d754e77b405468d1cee900dfff7f746c09c5ab9aa61a762b293d3af1e2c28abac29b5dc938d1c82ad0cf453907fbf3cfa646b1628acbfb13285aa71704442489654e15c806fb5e1b7b0eec110bb3a85abbe1d86d0b1035cc905f1907d0d903b857e5ce21daf0d05d5632500d6da608e0c92c7deda6d4267de2fe8083da269ff667b60cff874bbe00f6b7458ed9541a73a0f111c63c77176a900d56a8258ac595fde6783afbe396ad952df1946123d0ddcbc4b1924bed37e50b915eaca71bf2d284f34d161d9240804d24222348c2b098fc032e5f094653cc47df4a59b9dc151f139193414e3812c2db3c59a56f3b3a24ede6e49391f396048fa1aa6690f35e34cb622dbd0698631e8fdf1bc5f445a360f47dbaeb2ee44538e2053e11b025b64c412b152c8f350f5d0d1f003803c8629cdea172458671613602b4c0652c7ea8541be8553c02629a43527ca86f9f56d31e48edf3285ce826f077a93f52cd8535437545329c7716d39d08422311fee6ddba2f3d2a6f751495f1efb279419d51b4efa77f4a8d3cb135cf1a2b378350594ca1abaedea9e71f15b6aa58ed20014307fadcf64482bcb3e7dc4aa272ca63c2bf59527f9e2c2e40861bc038302b3262fa8b313832c56ae644bde340e8f2c39dee74229eab1cdfeda1da4cc8b09b7a86e5c7a7b5a6b8e9e7a49c0ad818eaa580ceb039f853e0a505d3b546f6b5d85d253870693e9ac613b054f13e8a9d67273ac97c16cfcefe95861808f0bdcfc0a0d2c5187123ba844915014df947f354edd35c9cadb8b029449524c236d80d692bc343cfc4c165dfcbc23fa7010812fcb1e3ef828cd9443e2570ebd9089e10efb0940faa633059338cb5b9f5e978792ec231e13f0910dfd8b6fd41fcda334415e479a190557cf653314d4f66b134fb814d81216b3668e1c55927c45e19c1324bc784e2a1efc176e5a5453a80b58669e8d3a9adb3dcb5635fa2e270783b53ba43a3777b174f20a1691d0eadec5e10359dd14b53b3b7bf15d999815437bc73c4c3195384462a2f8e32589deea881924799ef950a96c8c97bd32ff14234a951803e657b26bc96b2334fc44ba378d3489b270c3df304452ad0e6b35ba550828d3734831a1d4e7f63d5ec80d606553d12d11893517bc11baf82b3caacd1492d420000000000000000d010000090000009fe516767fffe808d6ca465e821b6a9510000000000000000401000000010000a0000000000000000600000009000000f7bb8145415256404f4182e2b8827c1fe9bfb278a2944887e326a2e3d6f1dc65a4f1bea7b57de47067041d7c28cd49273421b819a27ffe5d54d438b94e427f37b16dab230c1a2aa932b9fd2f9c3cdcc35a229e4e9276e08fd13090f41da76868f78ca5e65a93a71219a446980168db2f08daec761c2ff863afb32f24c528acf407e52f407251c6605300000000000000a0000000000000001701000003000000ce78fd78d1d5c289717dd8ce72c2be40124d4793c24de51905a5773a11363dd89f6b9243c77f03bcd081998917b8ffad2619e3fdd1a70a5ca32a0532dedae5b9f89291376b2686c9b6f48ec21363e473defb33c788221bef4351cbef6b468ea81dcd65150416f78b828530549f61295eec98c4f7ab3a91bc0ee91802977e504f7fa7c8627d"], 0x1180, 0x10}, 0x8001) 06:40:32 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x10a, 0x0) [ 770.196840] hfs: unable to load iocharset "c-862" [ 770.201808] hfs: unable to parse mount options [ 770.227944] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x104, 0x0) [ 770.293295] attempt to access beyond end of device [ 770.298316] loop3: rw=4096, want=136, limit=5 [ 770.302878] gfs2: error 10 reading superblock [ 770.326565] hfs: unable to load iocharset "c-862" [ 770.331525] hfs: unable to parse mount options 06:40:32 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:32 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000080)=""/163, 0xa3}, {&(0x7f0000000200)=""/253, 0xfd}, {&(0x7f0000000300)=""/241, 0xf1}, {&(0x7f0000000000)=""/23, 0x17}, {&(0x7f0000000400)=""/235, 0xeb}], 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:32 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x19d, 0x0) [ 770.431174] attempt to access beyond end of device [ 770.436319] loop3: rw=4096, want=136, limit=5 [ 770.440878] gfs2: error 10 reading superblock 06:40:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x50000]}}, 0x1c) 06:40:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x17f, 0x0) 06:40:33 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp\n62'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:33 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x7, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = semget(0x1, 0x3, 0x3) semop(r1, &(0x7f0000000000)=[{0x4, 0x5, 0x800}, {0x0, 0x4, 0xd3399eba4d4bb6fb}, {0x3, 0x7, 0x800}, {0x0, 0xa34b, 0x1000}, {0x1, 0x9, 0x1800}, {0x6, 0x4, 0x1000}], 0x6) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:33 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x6c, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:33 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='attr/current\x00') ioctl$TUNSETLINK(r2, 0x400454cd, 0x30e) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) 06:40:33 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xcd, 0x0) 06:40:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x107, 0x0) 06:40:33 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:33 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xa00000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 771.102318] hfs: unable to load iocharset "cp [ 771.102318] 62" [ 771.108776] hfs: unable to parse mount options [ 771.138468] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:33 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x18d, 0x0) 06:40:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = dup3(r0, r0, 0x80000) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 771.251258] hfs: unable to load iocharset "cp [ 771.251258] 62" [ 771.257654] hfs: unable to parse mount options 06:40:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x43, 0x0) 06:40:33 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:33 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp=62'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 771.434300] hfs: unable to load iocharset "cp=62" [ 771.439321] hfs: unable to parse mount options [ 771.477533] hfs: unable to load iocharset "cp=62" [ 771.482487] hfs: unable to parse mount options 06:40:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x91ffffff]}}, 0x1c) 06:40:34 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x9, 0x0) 06:40:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x211, 0x0) 06:40:34 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xbc03000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000000)=r0, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:34 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') ioctl$sock_ifreq(r0, 0x8933, &(0x7f00000001c0)={'gre0\x00', @ifru_settings={0x17a, 0x101, @sync=&(0x7f0000000180)={0x1f, 0x0, 0x8}}}) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) write$P9_RMKNOD(r0, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x1, 0x0, 0x2}}, 0x14) 06:40:34 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:34 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp8-2'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:34 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) mq_open(&(0x7f0000000000)='&ppp0cgroupwlan0\x00', 0x0, 0x44, &(0x7f0000000080)={0x101, 0xffffffffffffff97, 0x6, 0x7, 0x6, 0x1ff, 0x80000001, 0xffff}) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:34 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x7a000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:34 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x13, 0x0) [ 772.055947] hfs: unable to load iocharset "cp8-2" [ 772.060941] hfs: unable to parse mount options 06:40:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xe000000]}}, 0x1c) 06:40:34 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1b7, 0x0) 06:40:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tp, 0x80, &(0x7f0000000100)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000000)=""/26, 0x1a}], 0x2, 0x0, 0x0, 0x5}, 0x40010000) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 772.159803] hfs: unable to load iocharset "cp8-2" [ 772.164759] hfs: unable to parse mount options [ 772.178001] attempt to access beyond end of device [ 772.183058] loop3: rw=4096, want=136, limit=5 [ 772.187749] gfs2: error 10 reading superblock 06:40:34 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xea, 0x0) 06:40:34 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp802'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 772.249507] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 772.266534] attempt to access beyond end of device [ 772.271531] loop3: rw=4096, want=136, limit=5 [ 772.276105] gfs2: error 10 reading superblock 06:40:34 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:34 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xd000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:34 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x104, 0x0) [ 772.422464] hfs: unable to load iocharset "cp802" [ 772.427526] hfs: unable to parse mount options [ 772.479691] attempt to access beyond end of device [ 772.484788] loop3: rw=4096, want=136, limit=5 [ 772.489380] gfs2: error 10 reading superblock [ 772.503641] hfs: unable to load iocharset "cp802" [ 772.508637] hfs: unable to parse mount options 06:40:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1ce, 0x0) 06:40:34 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:34 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000026c0)=[{&(0x7f0000001380)=""/127}, {&(0x7f0000001400)=""/119}, {&(0x7f0000001480)=""/4096}, {&(0x7f00000032c0)=""/4096}, {&(0x7f0000002480)=""/138}, {&(0x7f0000002540)=""/53}, {&(0x7f0000002580)=""/154}, {&(0x7f0000002640)=""/74}], 0x580c7e2cb2fa6870, 0x3) pkey_free(0xffffffffffffffff) 06:40:34 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp8=2'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 772.551595] attempt to access beyond end of device [ 772.556626] loop3: rw=4096, want=136, limit=5 [ 772.561187] gfs2: error 10 reading superblock 06:40:34 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xe403, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:34 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x5a, 0x0) [ 772.680040] hfs: unable to load iocharset "cp8=2" [ 772.685156] hfs: unable to parse mount options [ 772.776586] hfs: unable to load iocharset "cp8=2" [ 772.781572] hfs: unable to parse mount options 06:40:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5400]}}, 0x1c) 06:40:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x120, 0x0) 06:40:35 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp8\n2'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 773.092151] hfs: unable to load iocharset "cp8 [ 773.092151] 2" [ 773.098561] hfs: unable to parse mount options 06:40:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) 06:40:35 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x48, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x41, 0x0) 06:40:35 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x8, 0x101000) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0), 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) 06:40:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x96, 0x0) [ 773.135307] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x17b, 0x0) [ 773.182218] attempt to access beyond end of device [ 773.187255] loop3: rw=4096, want=136, limit=5 [ 773.191814] gfs2: error 10 reading superblock [ 773.211137] hfs: unable to load iocharset "cp8 [ 773.211137] 2" [ 773.217468] hfs: unable to parse mount options 06:40:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1aa, 0x0) [ 773.260878] attempt to access beyond end of device [ 773.265939] loop3: rw=4096, want=136, limit=5 [ 773.270508] gfs2: error 10 reading superblock 06:40:35 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp8#2'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) r0 = socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x5, 0x11) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x2) sendto$llc(r2, &(0x7f0000000080)="37359ccd99d3e3b99c59eb41cedf61b294b7a8f07c4e364941ed41f67a3332b1d98525ed147d8641500b5c8938ef484c8fc7d1df8c1d1f0ce4fb6fc1e77586fe7abb32cd90949038ccc6be35c4857a31ea897de7154a7f48dfaf65816959d6b6963b198ce381d9b84ccb6a36e0355691ae3be61dc84de439690ee61c923fd1f58cbf2a3fc14d6e5b18d53e7a29bf9045c58db906d7641f42dcb39db47d8c8028e7fc5a50dd1ccc51d021", 0xaa, 0x8044, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in=@remote, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x209, 0x0) [ 773.438505] hfs: unable to load iocharset "cp8#2" [ 773.443493] hfs: unable to parse mount options [ 773.559479] hfs: unable to load iocharset "cp8#2" [ 773.564445] hfs: unable to parse mount options 06:40:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x18001) accept4$packet(r1, 0x0, &(0x7f0000000080), 0x80000) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x4) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000200)=""/108, &(0x7f0000000100)=0x6c) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000a40)=""/4096, 0x1000) 06:40:36 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x21, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:36 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp8+2'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x4c, 0x0) 06:40:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) r1 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000180)="9bc4681d87e5a80bd22ddafd5f4f6523813720fe862b2697ca11361a56490626db4b9fedb74e347efacd559adbdbff6042b3ca4a0d634869829a321e4ae8730d88e72c55135febe2f88afebce3b657c37d9eb9531667bf32d5a91e6e73c910b06c74d9dcd043555388326a3e4ace433a62d57ac2af71f4f32413b66cc998d190b508349e1fb14b4370301d6b40c318e1d2ab17f274", 0x95, 0x0) keyctl$read(0xb, r1, &(0x7f0000000240)=""/123, 0x7b) 06:40:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfef3136]}}, 0x1c) 06:40:36 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x5d, 0x0) 06:40:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1ee, 0x0) [ 774.027397] hfs: unable to load iocharset "cp8+2" [ 774.032475] hfs: unable to parse mount options 06:40:36 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) r1 = memfd_create(&(0x7f0000000000)='bdev\\\'vboxnet0vmnet1proc\x00', 0x1) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000080)=0xa, 0x4) 06:40:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:36 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1b2, 0x0) [ 774.100682] hfs: unable to load iocharset "cp8+2" [ 774.105639] hfs: unable to parse mount options 06:40:36 executing program 5: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x8) recvmmsg(r0, &(0x7f0000000000), 0x1, 0x20, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xd55) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') creat(&(0x7f0000000000)='./file0\x00', 0x80) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x100000001, 0x1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000180)={r2, 0x1021}, 0x8) pkey_free(0xffffffffffffffff) 06:40:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xa00000000000000]}}, 0x1c) 06:40:36 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp86='}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f00000000c0)={0x6c, ""/108}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'nr0\x00', 0x8500}) r3 = socket$kcm(0x29, 0x5, 0x0) r4 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x6, 0x2, 0x101, 0x9c, 0x0, 0x101, 0x0, 0xa, 0x2237a697, 0x10000, 0x3, 0xfff, 0x1ff, 0x100000000, 0x3ff, 0x7fff, 0x4, 0x7fff, 0xed7, 0x0, 0x382, 0x20, 0x10000, 0x27a, 0x8, 0x3, 0x20, 0x4, 0x9, 0x3f, 0xffffffffffff0000, 0x0, 0x10001, 0x4, 0x0, 0x100, 0x0, 0x7ff, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x1, 0x2, 0x0, 0x3, 0xa31, 0x1, 0x800}, r5, 0x6, 0xffffffffffffffff, 0x2) setsockopt$sock_attach_bpf(r4, 0x29, 0x1b, &(0x7f0000000040)=r4, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000340)={r6, 0x1}, &(0x7f0000000380)=0x8) 06:40:36 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xffffff7f, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x9, 0x0) 06:40:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002880)=[{&(0x7f00000004c0)=""/187, 0xbb}, {&(0x7f0000000580)=""/84, 0x54}, {&(0x7f0000000600)=""/164, 0xa4}, {&(0x7f00000006c0)=""/49, 0x31}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/4096, 0xfffffffffffffe9e}, {&(0x7f0000002700)=""/131, 0x83}, {&(0x7f00000027c0)=""/176, 0xb0}], 0x4}}], 0x1, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/102, 0x66}, {&(0x7f0000000200)=""/69, 0x45}, {&(0x7f0000000280)=""/236, 0xfffffffffffffcf9}, {&(0x7f0000000380)=""/224, 0x438}], 0x4, 0x0) pkey_free(0xffffffffffffffff) [ 774.309024] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 774.364265] hfs: unable to load iocharset "cp86=" [ 774.369284] hfs: unable to parse mount options 06:40:36 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x84030000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xf8, 0x0) [ 774.490145] hfs: unable to load iocharset "cp86=" [ 774.495119] hfs: unable to parse mount options 06:40:36 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}, 0x3d}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:36 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='htcp\x00', 0x5) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f00000004c0)={0x100000001, {{0xa, 0x4e20, 0x3f1b, @mcast2, 0x4}}, {{0xa, 0x4e24, 0x80, @mcast1, 0x6}}}, 0x108) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f00000001c0)={0x62c2, {{0xa, 0x4e22, 0x10000, @empty, 0x4451e90c}}, {{0xa, 0x4e23, 0x3, @local, 0x3}}}, 0x108) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') flistxattr(r3, &(0x7f0000000380)=""/212, 0xd4) preadv(r3, &(0x7f00000001c0), 0x0, 0x0) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f0000000480)) pkey_free(0xffffffffffffffff) 06:40:36 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1ae, 0x0) 06:40:36 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x2100, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 774.677410] hfs: unable to load iocharset "cp862=" [ 774.682484] hfs: unable to parse mount options [ 774.754688] hfs: unable to load iocharset "cp862=" [ 774.759830] hfs: unable to parse mount options 06:40:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000080)=0x9) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x23, 0x0) 06:40:37 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfffffdfc}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:37 executing program 5: r0 = request_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)='attr/current\x00', 0xfffffffffffffffc) keyctl$clear(0x7, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000000)={@remote, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x8) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r4 = getpid() syz_open_procfs(r4, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000015, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000002c0)) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x2) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) syz_open_procfs$namespace(r3, &(0x7f00000001c0)='ns/pid\x00') 06:40:37 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x7a00, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x801004be00000000]}}, 0x1c) 06:40:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x29, 0x0) [ 775.157794] hfs: unable to parse mount options 06:40:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x38, 0x0) 06:40:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 775.209523] hfs: unable to parse mount options 06:40:37 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xfffffdfc, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1b5, 0x0) 06:40:37 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x500000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 775.274210] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:37 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='stat\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x3) r2 = pkey_alloc(0x0, 0x3) pkey_free(r2) 06:40:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xe8, 0x0) 06:40:37 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0xa, 0x2, 0x11) pread64(r0, &(0x7f0000000000)=""/42, 0x2a, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xe01) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000100}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x104, r2, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x15, 0x20}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x78e6}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x800}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x16, 0x20}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff49b}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x104}, 0x1, 0x0, 0x0, 0x815}, 0x80) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:37 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xa0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 775.394019] hfs: can't find a HFS filesystem on dev loop6 [ 775.422116] hfs: can't find a HFS filesystem on dev loop6 06:40:37 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x900000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x0, 0x0) 06:40:37 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='attr/current\x00') ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000180)=""/14) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) [ 775.591413] hfs: can't find a HFS filesystem on dev loop6 [ 775.633477] hfs: can't find a HFS filesystem on dev loop6 06:40:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfe80000000000000]}}, 0x1c) 06:40:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1f3, 0x0) 06:40:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x0, 0x0) 06:40:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) r0 = socket$kcm(0x29, 0x5, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:38 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x6c00000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xa5, 0x0) 06:40:38 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffff1f0000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:38 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001680)={'syzkaller0\x00', 0x0}) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000016c0)={r1, 0x6, 0xfffffffffffffffc, 0x9, 0x4, 0x320, 0x80000001}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000180)=0x4) pkey_free(0xffffffffffffffff) ioctl$VT_RELDISP(r2, 0x5605) 06:40:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) r0 = socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = dup3(r1, r0, 0x80000) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000300)={'nat\x00', 0x0, 0x4, 0xcc, [], 0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000200)=""/204}, &(0x7f0000000380)=0x78) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='{%\x00', 0xffffffffffffff9c}, 0x10) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f00000000c0)) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 776.136820] hfs: can't find a HFS filesystem on dev loop6 06:40:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x0, 0x0) 06:40:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x95, 0x0) 06:40:38 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x23000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 776.201054] hfs: can't find a HFS filesystem on dev loop6 [ 776.219674] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x39, 0x0) 06:40:38 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x600000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) epoll_create(0xa562) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 776.322685] attempt to access beyond end of device [ 776.327737] loop3: rw=4096, want=136, limit=5 [ 776.332319] gfs2: error 10 reading superblock 06:40:38 executing program 0: r0 = request_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)='attr/current\x00', 0xfffffffffffffffc) keyctl$clear(0x7, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000000)={@remote, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x8) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r4 = getpid() syz_open_procfs(r4, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000015, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000002c0)) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x2) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) syz_open_procfs$namespace(r3, &(0x7f00000001c0)='ns/pid\x00') [ 776.387466] hfs: can't find a HFS filesystem on dev loop6 [ 776.434207] hfs: can't find a HFS filesystem on dev loop6 [ 776.452088] attempt to access beyond end of device [ 776.457163] loop3: rw=4096, want=136, limit=5 [ 776.461716] gfs2: error 10 reading superblock 06:40:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x801004be]}}, 0x1c) 06:40:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x52, 0x0) 06:40:39 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xdb, 0x0) 06:40:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) poll(&(0x7f0000000000)=[{r0, 0x80}], 0x1, 0x20) 06:40:39 executing program 0: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}, 0x3d}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:39 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xfcfdffff, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) [ 777.075800] hfs: can't find a HFS filesystem on dev loop6 [ 777.088245] hfs: unable to load iocharset "cp862=" [ 777.093255] hfs: unable to parse mount options 06:40:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1a0, 0x0) 06:40:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xfb, 0x0) 06:40:39 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xc00000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:39 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 777.134164] hfs: can't find a HFS filesystem on dev loop6 06:40:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x54]}}, 0x1c) 06:40:39 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x5354}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1ed, 0x0) 06:40:39 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000080)={0x0, 0x108000}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000240)="6c1d0be8d7cad489b2a8d0e49febeec172be8cbc889e8b2c67aa5f6563f85dd99f511760b3e836dd2350629bdee2d25dd028d79fcdf480a4c563527a8b3903fbb9e804942541d457fc164d75e1d1ac30fb48b122f6c7577a36d7f5bfbf4394969b0dea3345289f8ccf9e5425257b352dbfd0322bacaf2a87a86d3a89cc79e637fbf1188c56d4d952e159a0092fc6d0bfecac1f77a3049c27f701e2790e5aea300f261b8f29f362e8218390130c997137fa5991d0dc7a0b3f4053c6204500d9f369b8cd8eb1fd2dc2eb3f0589a9148a", 0xcf, 0xfffffffffffffff8) keyctl$link(0x8, r1, r2) socket$kcm(0x29, 0x5, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 777.307606] hfs: unable to parse mount options 06:40:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xe803]}}, 0x1c) 06:40:39 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x40000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 777.374182] hfs: unable to parse mount options 06:40:39 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x23}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:39 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffbff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc}, r0, 0xc, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x7, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 777.498102] hfs: unable to parse mount options 06:40:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb202]}}, 0x1c) [ 777.537861] hfs: unable to parse mount options 06:40:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x3) r1 = pkey_alloc(0x0, 0x3) pkey_free(r1) 06:40:39 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x19000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x8000) pkey_free(0xffffffffffffffff) 06:40:39 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4c}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x2f00]}}, 0x1c) 06:40:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xc2, 0x0) 06:40:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(r0, &(0x7f0000000780)={0x0, 0x3136, &(0x7f0000000000), 0x10000000000000cb, &(0x7f0000000940)=""/221, 0xdd, 0xfffbfffffffffffc}, 0x40000000) 06:40:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x19c, 0x0) 06:40:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x80000001, 0x44302) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x6, [0x9, 0x2, 0x2, 0x100000001, 0x100000001, 0x0]}, 0x10) mq_open(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x80, 0x44, &(0x7f0000000100)={0xffffffffffffff92, 0x3545, 0x6, 0x955, 0x1, 0x1, 0x2, 0x7}) r1 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000140)) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x4000, 0x0) [ 777.941046] attempt to access beyond end of device [ 777.946087] loop3: rw=4096, want=136, limit=5 [ 777.950657] gfs2: error 10 reading superblock [ 777.956634] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 777.956979] hfs: unable to parse mount options 06:40:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x22b, 0x0) [ 778.020510] attempt to access beyond end of device [ 778.025616] loop3: rw=4096, want=136, limit=5 [ 778.030195] gfs2: error 10 reading superblock [ 778.042869] hfs: unable to parse mount options 06:40:40 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffffffffa0010000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:40 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1f00, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x10000) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 778.182509] hfs: can't find a HFS filesystem on dev loop6 06:40:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x226, 0x0) 06:40:40 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1b, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 778.241949] hfs: can't find a HFS filesystem on dev loop6 06:40:40 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x3f00000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 778.366026] attempt to access beyond end of device [ 778.371239] loop3: rw=4096, want=136, limit=5 [ 778.375817] gfs2: error 10 reading superblock [ 778.424713] attempt to access beyond end of device [ 778.429753] loop3: rw=4096, want=136, limit=5 [ 778.434317] gfs2: error 10 reading superblock [ 778.447569] hfs: can't find a HFS filesystem on dev loop6 06:40:40 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000180)='a\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) pkey_alloc(0x0, 0x1) r3 = pkey_alloc(0x0, 0x1) pkey_free(r3) 06:40:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x100) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24800}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xb4, r2, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100000}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast1}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000}, 0x44004) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x80000001, 0x44302) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x6, [0x9, 0x2, 0x2, 0x100000001, 0x100000001, 0x0]}, 0x10) mq_open(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x80, 0x44, &(0x7f0000000100)={0xffffffffffffff92, 0x3545, 0x6, 0x955, 0x1, 0x1, 0x2, 0x7}) r1 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000140)) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x4000, 0x0) 06:40:40 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1ce, 0x0) [ 778.490908] hfs: can't find a HFS filesystem on dev loop6 06:40:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x40000000]}}, 0x1c) 06:40:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1dc, 0x0) 06:40:40 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xe00000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) 06:40:40 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xf5ffffff00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80002, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) 06:40:40 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') fchmod(r0, 0x20) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x1) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) 06:40:40 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xfe, 0x0) [ 778.829038] hfs: can't find a HFS filesystem on dev loop6 06:40:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f00000000c0)=0x2) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@rand_addr, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x2}, {{@in, 0x0, 0x3c}, 0x0, @in6}}, 0xe8) r2 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:40 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x5000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x14d, 0x0) [ 778.881150] hfs: can't find a HFS filesystem on dev loop6 [ 778.897746] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 06:40:41 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0xa, 0x2, 0x11) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0xa, 0x800, 0x5, &(0x7f0000000100)) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f00000000c0)={0x7}) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x168) ioctl$int_in(r1, 0x5473, &(0x7f0000000140)=0x2) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:41 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4d01}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 778.998824] attempt to access beyond end of device [ 779.003890] loop3: rw=4096, want=136, limit=5 [ 779.008465] gfs2: error 10 reading superblock [ 779.080596] hfs: unable to parse mount options 06:40:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 779.122266] attempt to access beyond end of device [ 779.127393] loop3: rw=4096, want=136, limit=5 [ 779.131955] gfs2: error 10 reading superblock [ 779.146082] hfs: unable to parse mount options 06:40:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x146, 0x0) 06:40:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xc80a0000]}}, 0x1c) 06:40:41 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1b00, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000180)={{0x7, 0x2}, 0x0, 0x1dd214bc, 0xf355, {0x7ff, 0x6}, 0x800, 0x400}) pkey_free(0xffffffffffffffff) 06:40:41 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfffffffb}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000000)=r0, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x96, 0x0) 06:40:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x10a, 0x0) 06:40:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') fchmod(r0, 0x20) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x1) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) [ 779.759144] hfs: unable to parse mount options [ 779.780951] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x140, 0x0) 06:40:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x9a, 0x0) 06:40:41 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x4c00, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 779.829072] hfs: unable to parse mount options 06:40:41 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4244000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xa9, 0x0) 06:40:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x3, 0x1, 0x5, 0x1, 0x0, 0x3ff, 0x0, 0x4, 0x9, 0x1, 0x9, 0xffffffffffffffff, 0xfffffffffffffff7, 0x5, 0xae, 0xffffffff, 0x0, 0x1, 0x5, 0x7, 0x3, 0x6, 0x8, 0x0, 0xac, 0x3, 0x1, 0x4, 0x7, 0x800, 0x3, 0xfffffffffffffffe, 0x10001, 0x7, 0x80000000, 0x9925, 0x0, 0x7f, 0x6, @perf_config_ext={0x6, 0x2}, 0x280a0, 0x0, 0x653447f7, 0xf4a0c77d83ca79b4, 0x5, 0x7, 0xfffffffffffffffa}, r2, 0xc, r0, 0x1) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 779.960778] attempt to access beyond end of device [ 779.965838] loop3: rw=4096, want=136, limit=5 [ 779.970394] gfs2: error 10 reading superblock [ 779.986786] hfs: can't find a HFS filesystem on dev loop6 06:40:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xae, 0x0) [ 780.029246] hfs: can't find a HFS filesystem on dev loop6 [ 780.041919] attempt to access beyond end of device [ 780.047019] loop3: rw=4096, want=136, limit=5 [ 780.051570] gfs2: error 10 reading superblock 06:40:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xa00]}}, 0x1c) 06:40:42 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xdb0d000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x7d, 0x0) 06:40:42 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1200, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) r1 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, r1) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xe8d, 0x200400) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000080)) 06:40:42 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) 06:40:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1f4, 0x0) 06:40:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x16c, 0x0) 06:40:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = msgget$private(0x0, 0x400) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000a40)=""/4096) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:42 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xa000000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x152, 0x0) [ 780.646450] hfs: can't find a HFS filesystem on dev loop6 [ 780.677465] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 780.731560] hfs: can't find a HFS filesystem on dev loop6 06:40:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0xa, 0x2, 0x11) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r1, 0xfffffffffffffe54) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) r1 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, r1) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xe8d, 0x200400) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000080)) 06:40:42 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x8601000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:42 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x3000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1ec, 0x0) [ 780.935176] hfs: can't find a HFS filesystem on dev loop6 [ 780.959818] hfs: can't find a HFS filesystem on dev loop6 06:40:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1802]}}, 0x1c) 06:40:43 executing program 0: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'co862'}}]}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x1000000000, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f00000000c0)=r0, 0x64e29b3252e79da9) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:43 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x74000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:43 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x1f000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x22a, 0x0) 06:40:43 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x3, 0xffffffffffffff9c}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8557, 0x40) socket$inet(0x2, 0x805, 0xfffffffffffffffb) 06:40:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x9c, 0x0) [ 781.378647] attempt to access beyond end of device [ 781.383706] loop3: rw=4096, want=136, limit=5 [ 781.388275] gfs2: error 10 reading superblock [ 781.394141] hfs: can't find a HFS filesystem on dev loop6 [ 781.399976] hfs: unable to load iocharset "co862" [ 781.404912] hfs: unable to parse mount options 06:40:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb00000000000000]}}, 0x1c) [ 781.447992] hfs: can't find a HFS filesystem on dev loop6 06:40:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x100) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80040012}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x88, r2, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x40}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x434335e6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d05}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x10001}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x0) 06:40:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = dup(r0) write$P9_RMKNOD(r2, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x0, 0x0, 0x2}}, 0x14) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:43 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x5}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1e3, 0x0) [ 781.536582] attempt to access beyond end of device [ 781.541641] loop3: rw=4096, want=136, limit=5 [ 781.546203] gfs2: error 10 reading superblock 06:40:43 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xb, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 781.597380] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 781.610591] hfs: unable to parse mount options 06:40:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80200, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1410000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r3, 0x12d, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}, @NBD_ATTR_SERVER_FLAGS={0x0, 0x5, 0x123}]}, 0xffffffffffffff02}, 0x1, 0x0, 0x0, 0x407fc}, 0x10) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000180)={0x1, r2}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r4, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) 06:40:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x7, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x9, 0x400) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0xfffffffffffeffff) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) get_mempolicy(&(0x7f0000000000), &(0x7f0000000080), 0x4, &(0x7f0000ff7000/0x7000)=nil, 0x2) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) [ 781.664521] hfs: unable to parse mount options 06:40:43 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x504d}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 781.716548] attempt to access beyond end of device [ 781.721599] loop3: rw=4096, want=136, limit=5 [ 781.726154] gfs2: error 10 reading superblock 06:40:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xfe, 0x0) 06:40:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x8d, 0x0) [ 781.821611] attempt to access beyond end of device [ 781.826675] loop3: rw=4096, want=136, limit=5 [ 781.831249] gfs2: error 10 reading superblock [ 781.842497] hfs: unable to parse mount options [ 781.876946] hfs: unable to parse mount options 06:40:43 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1d00000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005a001f00ff03f4f9002304000a04f51108000100020100020800028001000000", 0x24) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000080)=0x9) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x3, 0x101, 0x1f}}, 0x30) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:44 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x60}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 782.026874] hfs: unable to parse mount options 06:40:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x200000) write$9p(r0, &(0x7f0000000180)="f2ea570c41e02c8afe0f9d6d9dc3aae15bb142c8ca36b35c7e3c9d92eaaa824eb6dc4f0b978e39765116e8a26368c064e56932e9b3", 0x35) r1 = inotify_add_watch(r0, &(0x7f00000001c0)='./file0\x00', 0x42000008) inotify_rm_watch(r0, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) pkey_free(0xffffffffffffffff) 06:40:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x220, 0x0) [ 782.071021] hfs: unable to parse mount options 06:40:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb400]}}, 0x1c) 06:40:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xd6, 0x0) 06:40:44 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xf4ffffff00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:44 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x5002000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40121fffffffff, 0x11) r1 = memfd_create(&(0x7f0000000000)='&+-\x00', 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0xffffffff, 0x49, "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", 0xd0, 0x5, 0x5, 0x1, 0x9, 0x1, 0x7ff}, r2}}, 0x128) socket$kcm(0x29, 0x5, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x18) ioctl$KDDELIO(r1, 0x4b35, 0x2) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x591) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000940)=""/221, 0xdd}, 0x0) 06:40:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xb5, 0x0) 06:40:44 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x20000, 0x100) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000003c0)={0x0, 0x0, 0x7, 0x0, [], [{0x100000001, 0x9, 0x4, 0x8, 0x9, 0x9}, {0x6a, 0x401, 0xfffffffffffffffc, 0x7, 0x100000001, 0x8}], [[], [], [], [], [], [], []]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x127f, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x417, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x200001, 0x0) truncate(&(0x7f00000001c0)='./file0\x00', 0x8000) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r3, &(0x7f00000017c0), 0x1d0, 0x0) r4 = signalfd4(r2, &(0x7f00000002c0)={0x9}, 0x8, 0x80000) fcntl$setsig(r4, 0xa, 0x1f) sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="020901003257bb49434145d5fe816699400100000000000000bd7000fcdbdf2502001000000004d6000004d20000000002001300dc86659a1c1aada9601f0e79db7eee47ff00000025bd700004350000040006000200000003000000000000000800000000005d3a35c40000000000000800120002000700b66b6e000100000006003200400600000300000000000000ac14000000000000000000ff020000000000"], 0x90}}, 0x0) pkey_free(0xffffffffffffffff) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f0000000200)=""/41) 06:40:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x54, 0x0) [ 782.445337] hfs: can't find a HFS filesystem on dev loop6 [ 782.470266] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x200) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000340)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xc) fcntl$notify(r1, 0x402, 0x12) r4 = getpgid(r3) write$P9_RGETLOCK(r2, &(0x7f0000000180)={0x2b, 0x37, 0x2, {0x0, 0x90, 0xfffffffffffffff9, r4, 0xd, 'attr/current\x00'}}, 0x2b) fstat(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in=@multicast2, 0x4e21, 0x7f580, 0x4e20, 0x1b, 0x2, 0x20, 0x20, 0x32, 0x0, r5}, {0x2, 0x6, 0x7ab, 0x6, 0x2, 0x5, 0x80000001, 0x4}, {0x1000, 0x6, 0x2a, 0x100000001}, 0xf0, 0x0, 0x1, 0x0, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d4, 0x3c}, 0xa, @in=@rand_addr=0x4, 0x3505, 0x2, 0x1, 0x6, 0x3f, 0x5, 0x400}}, 0xe8) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000440)=0x1e) preadv(r6, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) 06:40:44 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x8cffffff00000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 782.502088] hfs: can't find a HFS filesystem on dev loop6 06:40:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0) 06:40:44 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xc5, 0x0) 06:40:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') r1 = semget(0x1, 0x4, 0x18) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x10000, 0xaac, 0x3]) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) 06:40:44 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4d01000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1e9, 0x0) [ 782.703166] hfs: can't find a HFS filesystem on dev loop6 [ 782.747066] hfs: can't find a HFS filesystem on dev loop6 06:40:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x600000000000000]}}, 0x1c) 06:40:45 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x800000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:45 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x294, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x19f, 0x0) 06:40:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x3c, 0x0) 06:40:45 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xe000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:45 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:45 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x56de, 0x2, 0x5, 0x9, 0x49a, 0x8}) pkey_free(0xffffffffffffffff) [ 783.325833] attempt to access beyond end of device [ 783.326266] FAULT_INJECTION: forcing a failure. [ 783.326266] name failslab, interval 1, probability 0, space 0, times 0 [ 783.330855] loop4: rw=4096, want=136, limit=5 [ 783.330877] gfs2: error 10 reading superblock [ 783.342116] CPU: 0 PID: 12082 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #216 [ 783.358442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.367901] Call Trace: [ 783.370509] dump_stack+0x1c9/0x2b4 06:40:45 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1a0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 783.374152] ? dump_stack_print_info.cold.2+0x52/0x52 [ 783.379361] should_fail.cold.4+0xa/0x11 [ 783.383444] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 783.388560] ? lock_downgrade+0x8f0/0x8f0 [ 783.392727] ? find_held_lock+0x36/0x1c0 [ 783.396812] ? find_held_lock+0x36/0x1c0 [ 783.400910] ? check_same_owner+0x340/0x340 [ 783.405290] ? rcu_note_context_switch+0x680/0x680 [ 783.410235] ? wait_for_completion+0x8d0/0x8d0 [ 783.414832] __should_failslab+0x124/0x180 [ 783.419092] should_failslab+0x9/0x14 [ 783.422908] kmem_cache_alloc+0x29c/0x710 [ 783.427096] getname_flags+0xd0/0x5a0 [ 783.430910] getname+0x19/0x20 [ 783.434129] do_sys_open+0x3a2/0x720 [ 783.437856] ? filp_open+0x80/0x80 [ 783.441407] ? __ia32_sys_read+0xb0/0xb0 [ 783.445492] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 783.450616] __x64_sys_openat+0x9d/0x100 [ 783.454691] do_syscall_64+0x1b9/0x820 [ 783.458599] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 783.463994] ? syscall_return_slowpath+0x5e0/0x5e0 [ 783.468947] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 783.469257] hfs: can't find a HFS filesystem on dev loop6 [ 783.473986] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 783.474002] ? recalc_sigpending_tsk+0x180/0x180 [ 783.474019] ? kasan_check_write+0x14/0x20 [ 783.474041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 783.474064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.474083] RIP: 0033:0x457099 [ 783.506807] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:40:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x34, 0x0) [ 783.525715] RSP: 002b:00007fced9ae5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 783.533434] RAX: ffffffffffffffda RBX: 00007fced9ae66d4 RCX: 0000000000457099 [ 783.540709] RDX: 0000000000048000 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 783.547987] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 783.555268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 783.562545] R13: 00000000004d38a0 R14: 00000000004c8527 R15: 0000000000000000 06:40:45 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x7a, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 783.603221] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 783.624246] hfs: can't find a HFS filesystem on dev loop6 06:40:45 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x165, 0x0) 06:40:45 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x5354000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:45 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x5, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x77, 0x0) [ 783.857080] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 783.867796] hfs: can't find a HFS filesystem on dev loop6 [ 783.934508] hfs: can't find a HFS filesystem on dev loop6 [ 783.972229] attempt to access beyond end of device [ 783.977292] loop3: rw=4096, want=136, limit=5 [ 783.981862] gfs2: error 10 reading superblock [ 784.034526] attempt to access beyond end of device [ 784.039574] loop3: rw=4096, want=136, limit=5 [ 784.044285] gfs2: error 10 reading superblock 06:40:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x64050000]}}, 0x1c) 06:40:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x22d, 0x0) 06:40:46 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x2000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:46 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xdc, 0x0) 06:40:46 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x2100000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:46 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x82) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000001c0)={0x40, 0x5, 0xf86a, 0xd996, 0xfff, 0x2, 0x0, 0x7, 0x6dff, 0x3}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) openat$cgroup_int(r2, &(0x7f0000000200)='cpuset.memory_spread_page\x00', 0x2, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) pkey_free(0xffffffffffffffff) 06:40:46 executing program 0 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 784.454729] FAULT_INJECTION: forcing a failure. [ 784.454729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 784.466590] CPU: 1 PID: 12131 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #216 [ 784.473967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.483330] Call Trace: [ 784.485953] dump_stack+0x1c9/0x2b4 [ 784.489608] ? dump_stack_print_info.cold.2+0x52/0x52 [ 784.494825] ? print_usage_bug+0xc0/0xc0 [ 784.498904] ? __lock_acquire+0x7fc/0x5020 [ 784.503172] should_fail.cold.4+0xa/0x11 [ 784.507251] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 784.512371] ? graph_lock+0x170/0x170 [ 784.516200] ? mark_held_locks+0x160/0x160 [ 784.520450] ? _parse_integer+0x13b/0x190 [ 784.524619] ? graph_lock+0x170/0x170 [ 784.528445] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 784.534009] ? _kstrtoull+0x188/0x250 [ 784.537824] ? _parse_integer+0x190/0x190 [ 784.541991] ? graph_lock+0x170/0x170 [ 784.545807] ? lock_release+0x9f0/0x9f0 [ 784.549801] ? find_held_lock+0x36/0x1c0 [ 784.551704] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 784.553880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.553900] ? should_fail+0x246/0xd86 [ 784.553923] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 784.578878] ? lock_downgrade+0x8f0/0x8f0 [ 784.583043] __alloc_pages_nodemask+0x365/0xd10 [ 784.587723] ? find_held_lock+0x36/0x1c0 [ 784.591799] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 784.596830] ? find_held_lock+0x36/0x1c0 [ 784.600923] ? trace_hardirqs_off+0xb8/0x2b0 [ 784.605358] cache_grow_begin+0x91/0x710 [ 784.609444] kmem_cache_alloc+0x63a/0x710 [ 784.613623] getname_flags+0xd0/0x5a0 [ 784.617442] getname+0x19/0x20 [ 784.620691] do_sys_open+0x3a2/0x720 [ 784.624420] ? filp_open+0x80/0x80 [ 784.627976] ? __ia32_sys_read+0xb0/0xb0 [ 784.632054] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 784.637177] __x64_sys_openat+0x9d/0x100 [ 784.641256] do_syscall_64+0x1b9/0x820 [ 784.645159] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 784.650539] ? syscall_return_slowpath+0x5e0/0x5e0 [ 784.655491] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 784.660524] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 784.665556] ? recalc_sigpending_tsk+0x180/0x180 [ 784.670412] ? kasan_check_write+0x14/0x20 [ 784.674665] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 784.679529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.684726] RIP: 0033:0x457099 06:40:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xb8, 0x0) 06:40:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x16c, 0x0) [ 784.687933] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 784.706856] RSP: 002b:00007fced9ae5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 784.714575] RAX: ffffffffffffffda RBX: 00007fced9ae66d4 RCX: 0000000000457099 [ 784.721851] RDX: 0000000000048000 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 784.729128] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 784.736403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 784.743680] R13: 00000000004d38a0 R14: 00000000004c8527 R15: 0000000000000001 06:40:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1bd, 0x0) 06:40:46 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1bd, 0x0) 06:40:46 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x15, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:46 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 784.758080] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 784.778315] hfs: can't find a HFS filesystem on dev loop6 06:40:46 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) recvmmsg(r0, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/155, 0x9b}], 0x1, &(0x7f0000000240)=""/4096, 0x1000, 0x4}, 0xfffffffffffffffd}, {{&(0x7f0000001240)=@nfc_llcp, 0x80, &(0x7f00000026c0)=[{&(0x7f00000012c0)=""/94, 0x5e}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/127, 0x7f}, {&(0x7f00000023c0)=""/157, 0x9d}, {&(0x7f0000002480)}, {&(0x7f00000024c0)=""/145, 0x91}, {&(0x7f0000002580)=""/5, 0x5}, {&(0x7f00000032c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/231, 0xe7}], 0x9, &(0x7f0000002780)=""/151, 0x97, 0x1}, 0x3d7}, {{&(0x7f0000002840)=@nfc_llcp, 0x80, &(0x7f0000002a40)=[{&(0x7f00000028c0)=""/148, 0x94}, {&(0x7f0000002980)=""/158, 0x9e}, {&(0x7f00000042c0)=""/4096, 0x1000}], 0x3, &(0x7f0000002a80)=""/223, 0xdf, 0x1}, 0xfffffffffffffff9}], 0x3, 0x102, &(0x7f0000002c40)) pkey_free(0xffffffffffffffff) [ 784.847150] hfs: can't find a HFS filesystem on dev loop6 [ 784.883336] attempt to access beyond end of device [ 784.888421] loop3: rw=4096, want=136, limit=5 [ 784.893009] gfs2: error 10 reading superblock 06:40:46 executing program 0 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 784.944885] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 784.978749] FAULT_INJECTION: forcing a failure. [ 784.978749] name failslab, interval 1, probability 0, space 0, times 0 [ 784.984093] attempt to access beyond end of device [ 784.990042] CPU: 1 PID: 12174 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #216 [ 784.990054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.990065] Call Trace: [ 784.995027] loop3: rw=4096, want=136, limit=5 [ 785.002363] dump_stack+0x1c9/0x2b4 [ 785.002390] ? dump_stack_print_info.cold.2+0x52/0x52 [ 785.002412] ? print_usage_bug+0xc0/0xc0 [ 785.011777] gfs2: error 10 reading superblock [ 785.014331] ? mark_held_locks+0x160/0x160 [ 785.014358] should_fail.cold.4+0xa/0x11 [ 785.014380] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 785.049628] ? print_usage_bug+0xc0/0xc0 [ 785.053706] ? __lock_acquire+0x7fc/0x5020 [ 785.057961] ? __lock_acquire+0x7fc/0x5020 [ 785.062208] ? graph_lock+0x170/0x170 [ 785.066029] ? find_held_lock+0x36/0x1c0 [ 785.070124] ? check_same_owner+0x340/0x340 [ 785.074466] ? rcu_note_context_switch+0x680/0x680 [ 785.079415] __should_failslab+0x124/0x180 [ 785.083667] should_failslab+0x9/0x14 [ 785.087484] kmem_cache_alloc+0x29c/0x710 [ 785.091643] ? graph_lock+0x170/0x170 [ 785.095453] ? print_usage_bug+0xc0/0xc0 [ 785.099531] ? mark_held_locks+0x160/0x160 [ 785.103780] __alloc_file+0xac/0x400 [ 785.107508] ? file_free_rcu+0x90/0x90 [ 785.111405] ? mark_held_locks+0x160/0x160 [ 785.115673] ? find_held_lock+0x36/0x1c0 [ 785.119758] ? lock_downgrade+0x8f0/0x8f0 [ 785.123920] alloc_empty_file+0x72/0x170 [ 785.128003] path_openat+0x15f/0x5340 [ 785.131808] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 785.136498] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 785.141188] ? graph_lock+0x170/0x170 [ 785.144993] ? path_lookupat.isra.43+0xc00/0xc00 [ 785.149751] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 785.154783] ? expand_files.part.8+0x571/0x9c0 [ 785.159377] ? find_held_lock+0x36/0x1c0 [ 785.163439] ? lock_downgrade+0x8f0/0x8f0 [ 785.167591] ? do_sys_open+0x3a2/0x720 [ 785.171473] ? kasan_check_read+0x11/0x20 [ 785.175621] ? do_raw_spin_unlock+0xa7/0x2f0 [ 785.180090] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 785.184680] ? __lock_is_held+0xb5/0x140 [ 785.188745] ? _raw_spin_unlock+0x22/0x30 [ 785.192881] ? __alloc_fd+0x34e/0x710 [ 785.196665] ? usercopy_warn+0x120/0x120 [ 785.200730] do_filp_open+0x255/0x380 [ 785.204529] ? may_open_dev+0x100/0x100 [ 785.208505] ? strncpy_from_user+0x3be/0x510 [ 785.212919] ? digsig_verify+0x1580/0x1580 [ 785.217167] ? get_unused_fd_flags+0x122/0x1a0 [ 785.221763] ? getname_flags+0x26e/0x5a0 [ 785.225833] do_sys_open+0x584/0x720 [ 785.229542] ? filp_open+0x80/0x80 [ 785.233069] ? __ia32_sys_read+0xb0/0xb0 [ 785.237143] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 785.242264] __x64_sys_openat+0x9d/0x100 [ 785.246325] do_syscall_64+0x1b9/0x820 [ 785.250210] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 785.255565] ? syscall_return_slowpath+0x5e0/0x5e0 [ 785.260496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 785.265338] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 785.270366] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 785.275394] ? prepare_exit_to_usermode+0x291/0x3b0 [ 785.280433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 785.285307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.290497] RIP: 0033:0x457099 [ 785.293690] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 785.312582] RSP: 002b:00007fced9ae5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 785.320303] RAX: ffffffffffffffda RBX: 00007fced9ae66d4 RCX: 0000000000457099 [ 785.327571] RDX: 0000000000048000 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 785.334834] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 06:40:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xe8030000]}}, 0x1c) 06:40:47 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x1a0}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:47 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180)=[{0xf, 0x20}, {0xb, 0x5}], 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) [ 785.342108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 785.349382] R13: 00000000004d38a0 R14: 00000000004c8527 R15: 0000000000000002 [ 785.367276] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 785.370957] hfs: unable to parse mount options 06:40:47 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x100000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x4f, 0x0) [ 785.413132] hfs: unable to parse mount options 06:40:47 executing program 0 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:47 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:47 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xedc0}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 785.457889] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 785.524499] FAULT_INJECTION: forcing a failure. [ 785.524499] name failslab, interval 1, probability 0, space 0, times 0 [ 785.535819] CPU: 0 PID: 12196 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #216 [ 785.543190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.552554] Call Trace: [ 785.555161] dump_stack+0x1c9/0x2b4 [ 785.558813] ? dump_stack_print_info.cold.2+0x52/0x52 [ 785.564016] ? lock_downgrade+0x8f0/0x8f0 [ 785.568193] should_fail.cold.4+0xa/0x11 06:40:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x41, 0x0) [ 785.572278] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 785.577409] ? is_bpf_text_address+0xd7/0x170 [ 785.581923] ? kernel_text_address+0x79/0xf0 [ 785.586364] ? __kernel_text_address+0xd/0x40 [ 785.590879] ? unwind_get_return_address+0x61/0xa0 [ 785.595826] ? __save_stack_trace+0x8d/0xf0 [ 785.600169] ? find_held_lock+0x36/0x1c0 [ 785.604271] ? check_same_owner+0x340/0x340 [ 785.608613] ? rcu_note_context_switch+0x680/0x680 [ 785.613555] ? lock_downgrade+0x8f0/0x8f0 [ 785.617726] __should_failslab+0x124/0x180 [ 785.621997] should_failslab+0x9/0x14 [ 785.625820] kmem_cache_alloc_trace+0x2b5/0x730 [ 785.630502] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 785.635207] apparmor_file_alloc_security+0x162/0xa90 [ 785.640409] ? trace_hardirqs_on+0xbd/0x2c0 [ 785.644832] ? rcu_pm_notify+0xc0/0xc0 [ 785.648741] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 785.654569] ? rcu_read_lock_sched_held+0x108/0x120 [ 785.659598] ? kmem_cache_alloc+0x30b/0x710 [ 785.663965] security_file_alloc+0x4c/0xa0 [ 785.668218] __alloc_file+0xfc/0x400 [ 785.671968] ? file_free_rcu+0x90/0x90 [ 785.675876] ? mark_held_locks+0x160/0x160 [ 785.680128] ? find_held_lock+0x36/0x1c0 [ 785.684223] ? lock_downgrade+0x8f0/0x8f0 [ 785.688399] alloc_empty_file+0x72/0x170 [ 785.692485] path_openat+0x15f/0x5340 [ 785.696499] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 785.701182] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 785.705872] ? graph_lock+0x170/0x170 [ 785.709693] ? path_lookupat.isra.43+0xc00/0xc00 [ 785.714480] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 785.719510] ? expand_files.part.8+0x571/0x9c0 06:40:47 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1500000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 785.724108] ? find_held_lock+0x36/0x1c0 [ 785.728190] ? lock_downgrade+0x8f0/0x8f0 [ 785.732344] ? do_sys_open+0x3a2/0x720 [ 785.736253] ? kasan_check_read+0x11/0x20 [ 785.740416] ? do_raw_spin_unlock+0xa7/0x2f0 [ 785.744833] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 785.744965] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 785.749425] ? __lock_is_held+0xb5/0x140 [ 785.749449] ? _raw_spin_unlock+0x22/0x30 [ 785.749466] ? __alloc_fd+0x34e/0x710 [ 785.749481] ? usercopy_warn+0x120/0x120 [ 785.749509] do_filp_open+0x255/0x380 [ 785.749528] ? may_open_dev+0x100/0x100 [ 785.781809] ? strncpy_from_user+0x3be/0x510 [ 785.786235] ? digsig_verify+0x1580/0x1580 [ 785.790489] ? get_unused_fd_flags+0x122/0x1a0 [ 785.795085] ? getname_flags+0x26e/0x5a0 [ 785.799166] do_sys_open+0x584/0x720 [ 785.802905] ? filp_open+0x80/0x80 [ 785.806467] ? __ia32_sys_read+0xb0/0xb0 [ 785.810543] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 785.815664] __x64_sys_openat+0x9d/0x100 [ 785.819739] do_syscall_64+0x1b9/0x820 06:40:47 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x8c, 0x0) 06:40:47 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 785.823638] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 785.829013] ? syscall_return_slowpath+0x5e0/0x5e0 [ 785.833975] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 785.839009] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 785.844034] ? recalc_sigpending_tsk+0x180/0x180 [ 785.848806] ? kasan_check_write+0x14/0x20 [ 785.853062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 785.857921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.863136] RIP: 0033:0x457099 [ 785.866338] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 785.885248] RSP: 002b:00007fced9ae5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 785.892977] RAX: ffffffffffffffda RBX: 00007fced9ae66d4 RCX: 0000000000457099 [ 785.900257] RDX: 0000000000048000 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 785.907531] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 785.914809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 785.922082] R13: 00000000004d38a0 R14: 00000000004c8527 R15: 0000000000000003 06:40:48 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4020}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r2, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040040}, 0x84) [ 785.983912] hfs: unable to parse mount options 06:40:48 executing program 0 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xcf, 0x0) [ 786.025548] hfs: unable to parse mount options 06:40:48 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x500, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 786.065573] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 786.092169] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 786.117827] FAULT_INJECTION: forcing a failure. [ 786.117827] name failslab, interval 1, probability 0, space 0, times 0 [ 786.129429] CPU: 0 PID: 12224 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #216 [ 786.136799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.146154] Call Trace: [ 786.148760] dump_stack+0x1c9/0x2b4 [ 786.152409] ? dump_stack_print_info.cold.2+0x52/0x52 [ 786.157628] should_fail.cold.4+0xa/0x11 [ 786.161703] ? misc_open+0x69/0x560 [ 786.165351] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 786.170477] ? mutex_trylock+0x2b0/0x2b0 [ 786.174555] ? mark_held_locks+0x160/0x160 [ 786.178807] ? graph_lock+0x170/0x170 [ 786.182619] ? mark_held_locks+0x160/0x160 [ 786.186869] ? find_held_lock+0x36/0x1c0 [ 786.190965] ? __lock_is_held+0xb5/0x140 [ 786.195064] ? check_same_owner+0x340/0x340 [ 786.199408] ? rcu_note_context_switch+0x680/0x680 [ 786.204357] __should_failslab+0x124/0x180 [ 786.208637] should_failslab+0x9/0x14 [ 786.212453] kmem_cache_alloc_trace+0x2b5/0x730 [ 786.217140] ? kasan_check_read+0x11/0x20 [ 786.221303] ? do_raw_spin_unlock+0xa7/0x2f0 [ 786.225727] ? userio_char_read+0x690/0x690 [ 786.230063] userio_char_open+0x49/0x1e2 [ 786.234132] ? userio_char_read+0x690/0x690 [ 786.238471] misc_open+0x3ca/0x560 [ 786.242032] ? misc_devnode+0x140/0x140 [ 786.246019] chrdev_open+0x25a/0x770 [ 786.249752] ? apparmor_capable+0x6c0/0x6c0 [ 786.254094] ? cdev_put.part.0+0x50/0x50 [ 786.258181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.263738] ? errseq_sample+0xe5/0x130 [ 786.267737] ? security_file_open+0x16f/0x1b0 [ 786.272262] do_dentry_open+0x499/0x1250 [ 786.276342] ? __devcgroup_check_permission+0x280/0x4d0 [ 786.281719] ? cdev_put.part.0+0x50/0x50 [ 786.285799] ? chown_common+0x730/0x730 [ 786.289820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.295376] ? security_inode_permission+0xd2/0x100 [ 786.300415] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 786.305447] ? inode_owner_or_capable+0x17f/0x1f0 [ 786.310311] vfs_open+0xa0/0xd0 [ 786.313633] path_openat+0x130f/0x5340 [ 786.317529] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 786.322208] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 786.326898] ? path_lookupat.isra.43+0xc00/0xc00 [ 786.331680] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 786.336710] ? expand_files.part.8+0x571/0x9c0 [ 786.341307] ? find_held_lock+0x36/0x1c0 [ 786.345392] ? lock_downgrade+0x8f0/0x8f0 [ 786.349551] ? do_sys_open+0x3a2/0x720 [ 786.353453] ? kasan_check_read+0x11/0x20 [ 786.357614] ? do_raw_spin_unlock+0xa7/0x2f0 [ 786.362040] ? do_raw_spin_trylock+0x1c0/0x1c0 06:40:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb2020000]}}, 0x1c) 06:40:48 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffffff8c}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:48 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x9f, 0x0) 06:40:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x161, 0x0) 06:40:48 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 786.366630] ? __lock_is_held+0xb5/0x140 [ 786.370703] ? _raw_spin_unlock+0x22/0x30 [ 786.374861] ? __alloc_fd+0x34e/0x710 [ 786.378671] ? usercopy_warn+0x120/0x120 [ 786.382752] do_filp_open+0x255/0x380 [ 786.386565] ? may_open_dev+0x100/0x100 [ 786.390553] ? strncpy_from_user+0x3be/0x510 [ 786.394993] ? digsig_verify+0x1580/0x1580 [ 786.399244] ? get_unused_fd_flags+0x122/0x1a0 [ 786.403842] ? getname_flags+0x26e/0x5a0 [ 786.407925] do_sys_open+0x584/0x720 [ 786.411698] ? filp_open+0x80/0x80 [ 786.415247] ? __ia32_sys_read+0xb0/0xb0 [ 786.419321] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 786.424437] __x64_sys_openat+0x9d/0x100 [ 786.428518] do_syscall_64+0x1b9/0x820 [ 786.432414] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 786.437794] ? syscall_return_slowpath+0x5e0/0x5e0 [ 786.442733] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 786.446880] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 786.447761] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 786.447791] ? recalc_sigpending_tsk+0x180/0x180 [ 786.447808] ? kasan_check_write+0x14/0x20 [ 786.447831] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 786.447854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.447866] RIP: 0033:0x457099 [ 786.447888] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 786.468881] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 786.470346] RSP: 002b:00007fced9ae5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 786.470364] RAX: ffffffffffffffda RBX: 00007fced9ae66d4 RCX: 0000000000457099 [ 786.470374] RDX: 0000000000048000 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 786.470382] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 786.470396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 786.483504] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 786.483598] R13: 00000000004d38a0 R14: 00000000004c8527 R15: 0000000000000004 06:40:48 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 786.589766] attempt to access beyond end of device [ 786.594769] loop3: rw=4096, want=136, limit=5 [ 786.599335] gfs2: error 10 reading superblock [ 786.609977] hfs: unable to parse mount options 06:40:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x14c, 0x0) [ 786.637776] hfs: unable to parse mount options 06:40:48 executing program 0 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 786.672801] attempt to access beyond end of device [ 786.677832] loop3: rw=4096, want=136, limit=5 [ 786.682393] gfs2: error 10 reading superblock 06:40:48 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 786.746869] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 786.773194] FAULT_INJECTION: forcing a failure. [ 786.773194] name failslab, interval 1, probability 0, space 0, times 0 [ 786.784542] CPU: 1 PID: 12261 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #216 [ 786.791910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.801278] Call Trace: [ 786.803886] dump_stack+0x1c9/0x2b4 [ 786.807535] ? dump_stack_print_info.cold.2+0x52/0x52 [ 786.812740] ? __kernel_text_address+0xd/0x40 [ 786.817257] ? unwind_get_return_address+0x61/0xa0 [ 786.822209] should_fail.cold.4+0xa/0x11 [ 786.826289] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 786.831414] ? save_stack+0x43/0xd0 [ 786.835056] ? kasan_kmalloc+0xc4/0xe0 [ 786.838968] ? kmem_cache_alloc_trace+0x152/0x730 [ 786.843826] ? userio_char_open+0x49/0x1e2 [ 786.848070] ? misc_open+0x3ca/0x560 [ 786.851794] ? chrdev_open+0x25a/0x770 [ 786.855697] ? graph_lock+0x170/0x170 [ 786.859513] ? do_sys_open+0x584/0x720 [ 786.863413] ? __x64_sys_openat+0x9d/0x100 [ 786.867663] ? do_syscall_64+0x1b9/0x820 [ 786.871741] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.877158] ? find_held_lock+0x36/0x1c0 [ 786.881244] ? __lock_is_held+0xb5/0x140 [ 786.885341] ? check_same_owner+0x340/0x340 [ 786.889687] ? __mutex_init+0x1f7/0x290 [ 786.893678] ? rcu_note_context_switch+0x680/0x680 [ 786.898625] __should_failslab+0x124/0x180 [ 786.902879] should_failslab+0x9/0x14 [ 786.906700] kmem_cache_alloc_trace+0x2b5/0x730 [ 786.911386] ? init_wait_entry+0x1c0/0x1c0 [ 786.915652] userio_char_open+0xdd/0x1e2 [ 786.919729] ? userio_char_read+0x690/0x690 [ 786.924069] misc_open+0x3ca/0x560 [ 786.927625] ? misc_devnode+0x140/0x140 [ 786.931616] chrdev_open+0x25a/0x770 [ 786.935351] ? apparmor_capable+0x6c0/0x6c0 [ 786.939698] ? cdev_put.part.0+0x50/0x50 [ 786.943783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.949326] ? errseq_sample+0xe5/0x130 [ 786.953323] ? security_file_open+0x16f/0x1b0 [ 786.957842] do_dentry_open+0x499/0x1250 [ 786.961923] ? __devcgroup_check_permission+0x280/0x4d0 [ 786.967315] ? cdev_put.part.0+0x50/0x50 [ 786.971397] ? chown_common+0x730/0x730 [ 786.975396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.980959] ? security_inode_permission+0xd2/0x100 [ 786.985989] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 786.991012] ? inode_owner_or_capable+0x17f/0x1f0 [ 786.995870] vfs_open+0xa0/0xd0 [ 786.999156] path_openat+0x130f/0x5340 [ 787.003057] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 787.007742] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 787.012442] ? path_lookupat.isra.43+0xc00/0xc00 [ 787.017218] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 787.022244] ? expand_files.part.8+0x571/0x9c0 [ 787.026837] ? find_held_lock+0x36/0x1c0 [ 787.030916] ? lock_downgrade+0x8f0/0x8f0 [ 787.035084] ? do_sys_open+0x3a2/0x720 [ 787.038987] ? kasan_check_read+0x11/0x20 [ 787.043146] ? do_raw_spin_unlock+0xa7/0x2f0 [ 787.047565] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 787.052155] ? __lock_is_held+0xb5/0x140 [ 787.056231] ? _raw_spin_unlock+0x22/0x30 [ 787.060389] ? __alloc_fd+0x34e/0x710 [ 787.064197] ? usercopy_warn+0x120/0x120 [ 787.068287] do_filp_open+0x255/0x380 [ 787.072096] ? may_open_dev+0x100/0x100 [ 787.076079] ? strncpy_from_user+0x3be/0x510 [ 787.080506] ? digsig_verify+0x1580/0x1580 [ 787.084754] ? get_unused_fd_flags+0x122/0x1a0 [ 787.089348] ? getname_flags+0x26e/0x5a0 [ 787.093425] do_sys_open+0x584/0x720 [ 787.097158] ? filp_open+0x80/0x80 [ 787.100711] ? __ia32_sys_read+0xb0/0xb0 [ 787.104782] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 787.109902] __x64_sys_openat+0x9d/0x100 [ 787.113990] do_syscall_64+0x1b9/0x820 [ 787.117890] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 787.123264] ? syscall_return_slowpath+0x5e0/0x5e0 [ 787.128204] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 787.133263] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 787.138286] ? recalc_sigpending_tsk+0x180/0x180 [ 787.143051] ? kasan_check_write+0x14/0x20 [ 787.147298] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 787.152157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.157349] RIP: 0033:0x457099 [ 787.160552] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 787.179465] RSP: 002b:00007fced9ae5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 787.187187] RAX: ffffffffffffffda RBX: 00007fced9ae66d4 RCX: 0000000000457099 06:40:48 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:48 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x85, 0x0) 06:40:48 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 787.194470] RDX: 0000000000048000 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 787.201740] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 787.209121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 787.216397] R13: 00000000004d38a0 R14: 00000000004c8527 R15: 0000000000000005 06:40:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}, 0x4}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) 06:40:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x33, 0x0) 06:40:49 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x9eb, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xad, 0x0) 06:40:49 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xff0f]}}, 0x1c) [ 787.239019] hfs: unable to parse mount options [ 787.258321] hfs: unable to parse mount options 06:40:49 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x14f}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x190, 0x0) 06:40:49 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x5, 0x0) 06:40:49 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xfdfdffff00000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 787.395794] hfs: unable to parse mount options [ 787.442721] hfs: unable to parse mount options 06:40:49 executing program 0 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb]}}, 0x1c) 06:40:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x193, 0x0) 06:40:49 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfdfdffff00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xd9, 0x0) [ 787.635831] hfs: can't find a HFS filesystem on dev loop6 [ 787.668066] hfs: can't find a HFS filesystem on dev loop6 06:40:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x8304) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) 06:40:49 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x300000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:49 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xd, 0x0) 06:40:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xf2, 0x0) 06:40:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:49 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfcfdffff00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xac8]}}, 0x1c) 06:40:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)="f06465762f75736572696f00", 0x48000, 0x0) [ 787.814895] hfs: can't find a HFS filesystem on dev loop6 06:40:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x228, 0x0) 06:40:49 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:49 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x3a030000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xfa, 0x0) 06:40:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1f00000000000000]}}, 0x1c) [ 787.869122] hfs: can't find a HFS filesystem on dev loop6 06:40:50 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x40000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:50 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x342) msgctl$IPC_RMID(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f0000000180), 0x0, 0x8000000000000000) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x2) r2 = pkey_alloc(0x0, 0x0) pkey_free(r2) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000000)='syz0\x00') 06:40:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='//ev/userio\x00', 0x48000, 0x0) [ 787.986634] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:50 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x7e00, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:50 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xed, 0x0) 06:40:50 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x4b, 0x0) [ 788.053772] hfs: can't find a HFS filesystem on dev loop6 [ 788.092934] hfs: can't find a HFS filesystem on dev loop6 06:40:50 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xf6ffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:50 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) pkey_free(0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000180)=0xfffffffffffffeb9) 06:40:50 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x82, 0x0) 06:40:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/.ev/userio\x00', 0x48000, 0x0) 06:40:50 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xffffff8c, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:50 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x29, 0x0) [ 788.270793] hfs: unable to parse mount options 06:40:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)="2f646576f075736572696f00", 0x48000, 0x0) [ 788.337071] hfs: unable to parse mount options 06:40:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x20000]}}, 0x1c) 06:40:50 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80000001, 0x20000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000180)={0x0, 0x40, 0x1, 0x3, 0xffff, 0x1ff, 0x7, 0x80, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="b8defffffce5e801884581d05716d4565e3a6d55c72f5f93060fa6f5c7bd6f47d41005ab819589596e20a43ac1ee416058bb04392f4a7d512fc1d3fa4ddf1816ef6d075d898fcab55ec4d9b64e69d600641d671a32eed29394b4e042d636ab614d5b3328291ee2cc74daa3e3552d062b34a6378b450925bada8ac1904c8be959257ed4ea3f0ccd7ac5e64528d79a19158ede3f291b29cbdd330d827e62c6d0edcb7c04b943decefe62fd5c000000"], &(0x7f00000002c0)=0xc0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000300)=0x6, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r3, &(0x7f0000000500)=[{&(0x7f0000000380)=""/84}, {&(0x7f0000000400)=""/41}, {&(0x7f0000000440)=""/185}], 0x174, 0x0) sendmsg$alg(r2, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000540)="8e7870436e29774fa2ea1b6baccf5342507337b2d1ad41eb2dc8f9deeea136181621a7e8ddcecb0c1c85bc57ae1110d7f266a3cad169d834287eaa510e8f42ee1a30ce5e59449d6ad769caf828cb30d8ee2571b37d6e4140c1df4b9749d5169857e93a6a5a159fe95960065054f7b61bc237656b940f6b3c778ba1cd3d89a141c379ef8d4fbae83155299f8306b40fea89a1fc2c396e0ea936fb70a09fe98b6342352429f6651a8c2cfeb622b57356afe8eaf306905680a39ac57618b50b2a200a9fa17f3d19fd9b31f794ada2946aaf78c81e9987ee5baa422055fb07c710bbb6643f1819fc34474ce922c3f5476d3ddce1", 0xf2}, {&(0x7f0000000340)="7f185fce55a611fd2fc218384ad69dbb0cdc73a429f917c277f7a050c9e5c60a9d880a", 0x23}, {&(0x7f0000000640)="1032693e9a106178e33466369a594d6c349fdde39770d225e017274b1d3bdd65c4bb59a2164df73a9d17b181ee24950d74066c541ca56999a45fbe6105850a589b8cbc80111bc55b0717cbca745eeafd2e64beafba7cad1640958fbcd7759e692b0a2e8177ab0fc24fc5ba8d4027b7906f48036fe66a9b1308a3dd98285a71526a613ac19168ec68cc1905ea136279da", 0x90}, {&(0x7f0000000700)="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", 0x1000}], 0x4, &(0x7f0000001740)=[@op={0x18}], 0x18, 0x20000000}, 0x200408c1) pkey_free(0xffffffffffffffff) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000017c0)=0x8000) 06:40:50 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6c000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:50 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x172, 0x0) 06:40:50 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x62000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1ae, 0x0) 06:40:50 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/.serio\x00', 0x48000, 0x0) [ 788.828258] attempt to access beyond end of device [ 788.833311] loop3: rw=4096, want=136, limit=5 [ 788.837868] gfs2: error 10 reading superblock [ 788.863240] hfs: can't find a HFS filesystem on dev loop6 06:40:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev//serio\x00', 0x48000, 0x0) 06:40:51 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x74, 0x0) [ 788.897186] nla_parse: 17 callbacks suppressed [ 788.897197] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 788.905043] hfs: can't find a HFS filesystem on dev loop6 [ 788.919692] attempt to access beyond end of device [ 788.924699] loop3: rw=4096, want=136, limit=5 [ 788.929263] gfs2: error 10 reading superblock 06:40:51 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x12, 0x0) [ 788.947577] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 788.974675] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 789.022906] FAULT_INJECTION: forcing a failure. [ 789.022906] name failslab, interval 1, probability 0, space 0, times 0 [ 789.034315] CPU: 0 PID: 12469 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #216 [ 789.041693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.051053] Call Trace: [ 789.053658] dump_stack+0x1c9/0x2b4 [ 789.057309] ? dump_stack_print_info.cold.2+0x52/0x52 [ 789.062519] ? find_held_lock+0x36/0x1c0 [ 789.066600] should_fail.cold.4+0xa/0x11 [ 789.070679] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 789.075794] ? lock_downgrade+0x8f0/0x8f0 [ 789.079978] ? find_held_lock+0x36/0x1c0 [ 789.084066] ? find_held_lock+0x36/0x1c0 [ 789.088168] ? check_same_owner+0x340/0x340 [ 789.092513] ? rcu_note_context_switch+0x680/0x680 [ 789.097450] ? wait_for_completion+0x8d0/0x8d0 [ 789.102047] __should_failslab+0x124/0x180 [ 789.106293] should_failslab+0x9/0x14 [ 789.110097] kmem_cache_alloc+0x29c/0x710 [ 789.114262] getname_flags+0xd0/0x5a0 [ 789.118072] getname+0x19/0x20 [ 789.121272] do_sys_open+0x3a2/0x720 [ 789.124999] ? filp_open+0x80/0x80 [ 789.128550] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 789.134094] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 789.139206] ? ksys_ioctl+0x81/0xd0 [ 789.142843] __x64_sys_open+0x7e/0xc0 [ 789.146658] do_syscall_64+0x1b9/0x820 [ 789.150553] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 789.155928] ? syscall_return_slowpath+0x5e0/0x5e0 [ 789.160878] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 789.165904] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 789.170936] ? recalc_sigpending_tsk+0x180/0x180 [ 789.175713] ? kasan_check_write+0x14/0x20 [ 789.179978] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 789.184833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.190028] RIP: 0033:0x410dd1 [ 789.193230] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 789.212309] RSP: 002b:00007fb51fa9b7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 06:40:51 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffffff7f}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:51 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x9c030000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:51 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 789.220025] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000410dd1 [ 789.227293] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00007fb51fa9b850 [ 789.234560] RBP: 00000000009300a0 R08: 000000000000000f R09: 0000000000000000 [ 789.241846] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000004 [ 789.249114] R13: 00000000004d7128 R14: 00000000004ca2fc R15: 0000000000000000 06:40:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 789.318005] hfs: unable to parse mount options [ 789.345152] hfs: unable to parse mount options [ 789.359336] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 789.391822] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:40:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xcb564c57]}}, 0x1c) 06:40:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xc4, 0x0) 06:40:51 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x7802, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:51 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x10c, 0x0) 06:40:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:51 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x7ffffffffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:51 executing program 5 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:51 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 789.787161] FAULT_INJECTION: forcing a failure. [ 789.787161] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 789.799014] CPU: 0 PID: 12501 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #216 [ 789.806386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.815760] Call Trace: [ 789.818370] dump_stack+0x1c9/0x2b4 [ 789.822025] ? dump_stack_print_info.cold.2+0x52/0x52 [ 789.827232] ? print_usage_bug+0xc0/0xc0 [ 789.831315] should_fail.cold.4+0xa/0x11 [ 789.835402] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 789.840520] ? graph_lock+0x170/0x170 [ 789.844351] ? mark_held_locks+0x160/0x160 [ 789.848604] ? _parse_integer+0x13b/0x190 [ 789.852762] ? graph_lock+0x170/0x170 [ 789.856588] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 789.862136] ? _kstrtoull+0x188/0x250 [ 789.865968] ? _parse_integer+0x190/0x190 [ 789.870128] ? graph_lock+0x170/0x170 [ 789.873949] ? lock_release+0x9f0/0x9f0 [ 789.877960] ? find_held_lock+0x36/0x1c0 [ 789.879998] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 789.882051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.882071] ? should_fail+0x246/0xd86 [ 789.882094] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 789.882113] ? lock_downgrade+0x8f0/0x8f0 [ 789.909251] __alloc_pages_nodemask+0x365/0xd10 [ 789.913930] ? find_held_lock+0x36/0x1c0 [ 789.918029] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 789.923065] ? find_held_lock+0x36/0x1c0 [ 789.927158] ? trace_hardirqs_off+0xb8/0x2b0 [ 789.931581] cache_grow_begin+0x91/0x710 06:40:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xe, 0x0) [ 789.935663] kmem_cache_alloc+0x63a/0x710 [ 789.939829] getname_flags+0xd0/0x5a0 [ 789.943643] getname+0x19/0x20 [ 789.946848] do_sys_open+0x3a2/0x720 [ 789.950575] ? filp_open+0x80/0x80 [ 789.954132] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 789.959246] ? ksys_ioctl+0x81/0xd0 [ 789.962888] __x64_sys_open+0x7e/0xc0 [ 789.963460] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 789.966704] do_syscall_64+0x1b9/0x820 [ 789.966723] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 789.966742] ? syscall_return_slowpath+0x5e0/0x5e0 [ 789.966760] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 789.966778] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 789.966793] ? recalc_sigpending_tsk+0x180/0x180 [ 789.966809] ? kasan_check_write+0x14/0x20 [ 789.966830] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 790.013281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.018479] RIP: 0033:0x410dd1 [ 790.021684] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 790.029969] hfs: unable to parse mount options [ 790.040590] RSP: 002b:00007fb51fa9b7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 790.040608] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000410dd1 [ 790.040618] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00007fb51fa9b850 [ 790.040627] RBP: 00000000009300a0 R08: 000000000000000f R09: 0000000000000000 [ 790.040637] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000004 06:40:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 790.040646] R13: 00000000004d7128 R14: 00000000004ca2fc R15: 0000000000000001 06:40:52 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1c1, 0x0) 06:40:52 executing program 5 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 790.139220] hfs: unable to parse mount options 06:40:52 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x600, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:52 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x74}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xdd, 0x0) [ 790.164860] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 790.197663] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:40:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5555]}}, 0x1c) 06:40:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 790.247027] attempt to access beyond end of device [ 790.252102] loop3: rw=4096, want=136, limit=5 [ 790.256697] gfs2: error 10 reading superblock [ 790.295810] hfs: unable to parse mount options 06:40:52 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfffffff5}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 790.327744] hfs: unable to parse mount options [ 790.333018] attempt to access beyond end of device [ 790.338092] loop3: rw=4096, want=136, limit=5 [ 790.342639] gfs2: error 10 reading superblock 06:40:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f75736572696ff6", 0x48000, 0x0) [ 790.393928] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 790.404795] FAULT_INJECTION: forcing a failure. [ 790.404795] name failslab, interval 1, probability 0, space 0, times 0 [ 790.416086] CPU: 1 PID: 12553 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #216 [ 790.423459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.432831] Call Trace: [ 790.435437] dump_stack+0x1c9/0x2b4 [ 790.439104] ? dump_stack_print_info.cold.2+0x52/0x52 [ 790.444317] ? mark_held_locks+0x160/0x160 [ 790.448575] should_fail.cold.4+0xa/0x11 [ 790.452682] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 790.457792] ? print_usage_bug+0xc0/0xc0 [ 790.461879] ? __lock_acquire+0x7fc/0x5020 [ 790.466140] ? find_held_lock+0x36/0x1c0 [ 790.470244] ? check_same_owner+0x340/0x340 [ 790.474592] ? rcu_note_context_switch+0x680/0x680 [ 790.479534] ? __lock_acquire+0x7fc/0x5020 [ 790.483822] __should_failslab+0x124/0x180 [ 790.488112] should_failslab+0x9/0x14 [ 790.491969] kmem_cache_alloc+0x29c/0x710 [ 790.496146] ? graph_lock+0x170/0x170 [ 790.499971] ? mark_held_locks+0x160/0x160 [ 790.504227] __alloc_file+0xac/0x400 [ 790.507976] ? file_free_rcu+0x90/0x90 [ 790.511874] ? mark_held_locks+0x160/0x160 [ 790.516125] ? find_held_lock+0x36/0x1c0 [ 790.520222] ? lock_downgrade+0x8f0/0x8f0 [ 790.524403] alloc_empty_file+0x72/0x170 [ 790.528493] path_openat+0x15f/0x5340 [ 790.532313] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 790.536989] ? graph_lock+0x170/0x170 [ 790.540810] ? graph_lock+0x170/0x170 [ 790.544627] ? path_lookupat.isra.43+0xc00/0xc00 [ 790.549401] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 790.554431] ? expand_files.part.8+0x571/0x9c0 [ 790.559048] ? find_held_lock+0x36/0x1c0 [ 790.563137] ? lock_downgrade+0x8f0/0x8f0 [ 790.567458] ? do_sys_open+0x3a2/0x720 [ 790.571373] ? kasan_check_read+0x11/0x20 [ 790.575585] ? do_raw_spin_unlock+0xa7/0x2f0 [ 790.580007] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 790.584600] ? __lock_is_held+0xb5/0x140 [ 790.588684] ? _raw_spin_unlock+0x22/0x30 [ 790.592866] ? __alloc_fd+0x34e/0x710 [ 790.596678] ? usercopy_warn+0x120/0x120 [ 790.600765] do_filp_open+0x255/0x380 [ 790.604614] ? may_open_dev+0x100/0x100 [ 790.608612] ? get_unused_fd_flags+0x122/0x1a0 [ 790.613206] ? __alloc_fd+0x710/0x710 [ 790.617031] do_sys_open+0x584/0x720 [ 790.620759] ? filp_open+0x80/0x80 [ 790.624313] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 790.629862] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 790.635003] ? ksys_ioctl+0x81/0xd0 [ 790.638646] __x64_sys_open+0x7e/0xc0 [ 790.642498] do_syscall_64+0x1b9/0x820 [ 790.646405] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 790.651779] ? syscall_return_slowpath+0x5e0/0x5e0 [ 790.656728] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 790.661754] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 790.666776] ? recalc_sigpending_tsk+0x180/0x180 [ 790.671546] ? kasan_check_write+0x14/0x20 [ 790.675798] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 790.680657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.685850] RIP: 0033:0x410dd1 [ 790.689057] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 790.707972] RSP: 002b:00007fb51fa597a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 790.715693] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000410dd1 [ 790.722979] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00007fb51fa59850 [ 790.730256] RBP: 00000000009301e0 R08: 000000000000000f R09: 0000000000000000 [ 790.737533] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 06:40:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x105, 0x0) 06:40:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xaaaa000000000000]}}, 0x1c) 06:40:52 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x32, 0x0) 06:40:52 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x7e00000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 790.744809] R13: 00000000004d7128 R14: 00000000004ca2fc R15: 0000000000000002 [ 790.764028] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:40:52 executing program 5 (fault-call:2 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:52 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 790.825440] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 790.829121] hfs: unable to parse mount options 06:40:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xea, 0x0) [ 790.892168] FAULT_INJECTION: forcing a failure. [ 790.892168] name failslab, interval 1, probability 0, space 0, times 0 [ 790.903612] CPU: 0 PID: 12576 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #216 [ 790.910989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.920351] Call Trace: [ 790.922977] dump_stack+0x1c9/0x2b4 [ 790.926629] ? dump_stack_print_info.cold.2+0x52/0x52 [ 790.931837] ? lock_downgrade+0x8f0/0x8f0 [ 790.936018] should_fail.cold.4+0xa/0x11 [ 790.940103] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 790.945238] ? is_bpf_text_address+0xd7/0x170 [ 790.949842] ? kernel_text_address+0x79/0xf0 [ 790.954272] ? __kernel_text_address+0xd/0x40 [ 790.958784] ? unwind_get_return_address+0x61/0xa0 [ 790.963732] ? __save_stack_trace+0x8d/0xf0 [ 790.968071] ? find_held_lock+0x36/0x1c0 [ 790.972174] ? check_same_owner+0x340/0x340 [ 790.976520] ? rcu_note_context_switch+0x680/0x680 [ 790.981471] ? lock_downgrade+0x8f0/0x8f0 [ 790.985644] __should_failslab+0x124/0x180 [ 790.989894] should_failslab+0x9/0x14 [ 790.993711] kmem_cache_alloc_trace+0x2b5/0x730 [ 790.998397] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 791.003095] apparmor_file_alloc_security+0x162/0xa90 [ 791.008301] ? trace_hardirqs_on+0xbd/0x2c0 [ 791.012643] ? rcu_pm_notify+0xc0/0xc0 [ 791.016557] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 791.022383] ? rcu_read_lock_sched_held+0x108/0x120 [ 791.027417] ? kmem_cache_alloc+0x30b/0x710 [ 791.031755] ? graph_lock+0x170/0x170 [ 791.035575] security_file_alloc+0x4c/0xa0 [ 791.039831] __alloc_file+0xfc/0x400 [ 791.043563] ? file_free_rcu+0x90/0x90 [ 791.047462] ? mark_held_locks+0x160/0x160 [ 791.051723] ? find_held_lock+0x36/0x1c0 [ 791.055808] ? lock_downgrade+0x8f0/0x8f0 [ 791.060012] alloc_empty_file+0x72/0x170 [ 791.064108] path_openat+0x15f/0x5340 [ 791.067930] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 791.072640] ? graph_lock+0x170/0x170 [ 791.076472] ? graph_lock+0x170/0x170 [ 791.080302] ? path_lookupat.isra.43+0xc00/0xc00 [ 791.085076] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 791.090104] ? expand_files.part.8+0x571/0x9c0 [ 791.094700] ? find_held_lock+0x36/0x1c0 [ 791.098781] ? lock_downgrade+0x8f0/0x8f0 [ 791.102950] ? do_sys_open+0x3a2/0x720 [ 791.106861] ? kasan_check_read+0x11/0x20 [ 791.111019] ? do_raw_spin_unlock+0xa7/0x2f0 [ 791.115439] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 791.120033] ? __lock_is_held+0xb5/0x140 [ 791.124119] ? _raw_spin_unlock+0x22/0x30 [ 791.128282] ? __alloc_fd+0x34e/0x710 [ 791.132096] ? usercopy_warn+0x120/0x120 [ 791.136176] do_filp_open+0x255/0x380 [ 791.138012] hfs: unable to parse mount options [ 791.139990] ? may_open_dev+0x100/0x100 [ 791.140021] ? get_unused_fd_flags+0x122/0x1a0 [ 791.140038] ? __alloc_fd+0x710/0x710 [ 791.140062] do_sys_open+0x584/0x720 [ 791.160695] ? filp_open+0x80/0x80 [ 791.164249] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 791.169797] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 791.174908] ? ksys_ioctl+0x81/0xd0 [ 791.178562] __x64_sys_open+0x7e/0xc0 [ 791.182373] do_syscall_64+0x1b9/0x820 [ 791.186277] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 791.191654] ? syscall_return_slowpath+0x5e0/0x5e0 [ 791.196600] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 791.201626] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 791.206653] ? recalc_sigpending_tsk+0x180/0x180 [ 791.211415] ? kasan_check_write+0x14/0x20 [ 791.215666] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 791.220528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.225742] RIP: 0033:0x410dd1 06:40:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x78, 0x0) 06:40:53 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0xc, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:53 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xf6ffffff, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:53 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1c3, 0x0) [ 791.228954] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 791.247869] RSP: 002b:00007fb51fa9b7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 791.255592] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000410dd1 [ 791.262872] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00007fb51fa9b850 [ 791.270146] RBP: 00000000009300a0 R08: 000000000000000f R09: 0000000000000000 [ 791.277419] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000004 [ 791.284701] R13: 00000000004d7128 R14: 00000000004ca2fc R15: 0000000000000003 06:40:53 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4c00000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:53 executing program 5 (fault-call:2 fault-nth:4): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:53 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f75736572696fa0", 0x48000, 0x0) [ 791.425696] hfs: can't find a HFS filesystem on dev loop6 [ 791.455613] FAULT_INJECTION: forcing a failure. [ 791.455613] name failslab, interval 1, probability 0, space 0, times 0 [ 791.467070] CPU: 1 PID: 12607 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #216 [ 791.474448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.483815] Call Trace: [ 791.486423] dump_stack+0x1c9/0x2b4 [ 791.490079] ? dump_stack_print_info.cold.2+0x52/0x52 [ 791.495300] should_fail.cold.4+0xa/0x11 [ 791.499376] ? rcu_note_context_switch+0x680/0x680 [ 791.504326] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 791.509455] ? kasan_check_write+0x14/0x20 [ 791.513716] ? __mutex_lock+0x6d0/0x1700 [ 791.517793] ? nbd_open+0x277/0x480 [ 791.521435] ? graph_lock+0x170/0x170 [ 791.525263] ? mutex_trylock+0x2b0/0x2b0 [ 791.529341] ? kasan_check_write+0x14/0x20 [ 791.533589] ? __mutex_lock+0x6d0/0x1700 [ 791.537671] ? __blkdev_get+0x19b/0x13c0 [ 791.541748] ? __lock_is_held+0xb5/0x140 [ 791.545840] ? check_same_owner+0x340/0x340 [ 791.550183] ? rcu_note_context_switch+0x680/0x680 [ 791.555136] __should_failslab+0x124/0x180 [ 791.559391] should_failslab+0x9/0x14 [ 791.563212] kmem_cache_alloc_trace+0x2b5/0x730 [ 791.567909] nbd_alloc_config+0xaf/0x280 [ 791.571995] ? nbd_dead_link_work+0x380/0x380 [ 791.576512] ? lock_downgrade+0x8f0/0x8f0 [ 791.580677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.586232] nbd_open+0x2a7/0x480 [ 791.589701] ? nbd_alloc_config+0x280/0x280 [ 791.594035] ? kobject_get+0x6b/0xc0 [ 791.597768] ? nbd_alloc_config+0x280/0x280 [ 791.602106] __blkdev_get+0x360/0x13c0 [ 791.606021] ? blkdev_get_block+0xc0/0xc0 [ 791.610191] blkdev_get+0xc1/0xb50 [ 791.613747] ? bdget+0x5e0/0x5e0 [ 791.617130] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 791.621735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.627293] ? errseq_sample+0xe5/0x130 [ 791.631284] ? _copy_to_user+0x110/0x110 [ 791.635363] ? _raw_spin_unlock+0x22/0x30 [ 791.639532] blkdev_open+0x1fb/0x280 [ 791.643264] do_dentry_open+0x499/0x1250 [ 791.647343] ? __devcgroup_check_permission+0x280/0x4d0 [ 791.652722] ? bd_acquire+0x2c0/0x2c0 [ 791.656534] ? chown_common+0x730/0x730 [ 791.660522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.666070] ? security_inode_permission+0xd2/0x100 [ 791.671100] ? inode_permission+0xb2/0x560 [ 791.675356] vfs_open+0xa0/0xd0 [ 791.678649] path_openat+0x130f/0x5340 [ 791.682549] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 791.687247] ? path_lookupat.isra.43+0xc00/0xc00 [ 791.692013] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 791.697542] ? expand_files.part.8+0x571/0x9c0 [ 791.702137] ? find_held_lock+0x36/0x1c0 [ 791.706221] ? lock_downgrade+0x8f0/0x8f0 [ 791.710374] ? do_sys_open+0x3a2/0x720 [ 791.714282] ? kasan_check_read+0x11/0x20 [ 791.718441] ? do_raw_spin_unlock+0xa7/0x2f0 [ 791.722866] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 791.727454] ? __lock_is_held+0xb5/0x140 [ 791.731540] ? _raw_spin_unlock+0x22/0x30 [ 791.735700] ? __alloc_fd+0x34e/0x710 [ 791.739509] ? usercopy_warn+0x120/0x120 [ 791.743590] do_filp_open+0x255/0x380 [ 791.747425] ? may_open_dev+0x100/0x100 [ 791.751431] ? get_unused_fd_flags+0x122/0x1a0 [ 791.756034] ? __alloc_fd+0x710/0x710 [ 791.759848] ? do_syscall_64+0x6be/0x820 [ 791.763927] do_sys_open+0x584/0x720 [ 791.767662] ? filp_open+0x80/0x80 [ 791.771211] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 791.776323] ? ksys_ioctl+0x81/0xd0 [ 791.779971] __x64_sys_open+0x7e/0xc0 [ 791.783786] do_syscall_64+0x1b9/0x820 [ 791.787687] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 791.793065] ? syscall_return_slowpath+0x5e0/0x5e0 [ 791.798005] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 791.803030] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 791.808052] ? recalc_sigpending_tsk+0x180/0x180 [ 791.812823] ? kasan_check_write+0x14/0x20 [ 791.817073] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 791.821935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.827142] RIP: 0033:0x410dd1 [ 791.830345] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 791.849257] RSP: 002b:00007fb51fa9b7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 791.856978] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000410dd1 [ 791.864274] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00007fb51fa9b850 [ 791.871723] RBP: 00000000009300a0 R08: 000000000000000f R09: 0000000000000000 [ 791.878999] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000004 [ 791.886276] R13: 00000000004d7128 R14: 00000000004ca2fc R15: 0000000000000004 06:40:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfc00000000000000]}}, 0x1c) 06:40:54 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x6800, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x18, 0x0) 06:40:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1c, 0x0) 06:40:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f75736572696f04", 0x48000, 0x0) 06:40:54 executing program 5 (fault-call:2 fault-nth:5): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:54 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4800000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:54 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 791.935154] hfs: can't find a HFS filesystem on dev loop6 06:40:54 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x700000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x84, 0x0) 06:40:54 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x224, 0x0) 06:40:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 792.062408] hfs: can't find a HFS filesystem on dev loop6 [ 792.084710] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 792.128814] hfs: can't find a HFS filesystem on dev loop6 06:40:54 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x700000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:54 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x500000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 792.345410] hfs: can't find a HFS filesystem on dev loop6 [ 792.405265] hfs: can't find a HFS filesystem on dev loop6 06:40:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1f00]}}, 0x1c) 06:40:54 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:54 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1ca, 0x0) 06:40:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f75736572696fff", 0x48000, 0x0) 06:40:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/.ev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d1, 0x0) 06:40:54 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:54 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x1a0ffffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 792.897311] attempt to access beyond end of device [ 792.902424] loop3: rw=4096, want=136, limit=5 [ 792.906999] gfs2: error 10 reading superblock [ 792.916233] hfs: unable to parse mount options [ 792.937513] hfs: unable to parse mount options 06:40:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f75736572696fff", 0x48000, 0x0) 06:40:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='//ev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:55 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 792.959603] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:55 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x9eb}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 793.001119] attempt to access beyond end of device [ 793.006184] loop3: rw=4096, want=136, limit=5 [ 793.010767] gfs2: error 10 reading superblock 06:40:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/.bd#\x00', 0xffffffffffffffff, 0x800) 06:40:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x108, 0x0) 06:40:55 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x78020000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:55 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 793.151920] hfs: unable to parse mount options [ 793.201237] hfs: unable to parse mount options 06:40:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xc0fe]}}, 0x1c) 06:40:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x8b, 0x0) 06:40:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev//bd#\x00', 0xffffffffffffffff, 0x800) 06:40:55 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x86010000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:55 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:55 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x14d}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xfd, 0x0) [ 793.823581] hfs: unable to parse mount options 06:40:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nb.#\x00', 0xffffffffffffffff, 0x800) [ 793.852422] hfs: unable to parse mount options 06:40:55 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x57, 0x0) 06:40:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f75736572696f02", 0x48000, 0x0) 06:40:55 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x6000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:55 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4c010000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:55 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x21a, 0x0) 06:40:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x100000000000000]}}, 0x1c) [ 793.996322] attempt to access beyond end of device [ 793.998108] hfs: can't find a HFS filesystem on dev loop6 [ 794.001383] loop3: rw=4096, want=136, limit=5 [ 794.011514] gfs2: error 10 reading superblock 06:40:56 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x151, 0x0) 06:40:56 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nb/#\x00', 0xffffffffffffffff, 0x800) 06:40:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 794.041416] nla_parse: 18 callbacks suppressed [ 794.041426] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 794.065711] hfs: can't find a HFS filesystem on dev loop6 06:40:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x74, 0x0) [ 794.105991] attempt to access beyond end of device [ 794.111019] loop3: rw=4096, want=136, limit=5 [ 794.115591] gfs2: error 10 reading superblock [ 794.132259] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 794.146492] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:56 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xc960300}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:40:56 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:56 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x6200, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:56 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1bb, 0x0) 06:40:56 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x66, 0x0) 06:40:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48004, 0x0) [ 794.266560] hfs: can't find a HFS filesystem on dev loop6 06:40:56 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x2000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:56 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)="2f6465762f6e626423ff", 0xffffffffffffffff, 0x800) [ 794.324729] hfs: can't find a HFS filesystem on dev loop6 06:40:56 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x8cffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 794.390976] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 794.462712] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 794.488094] hfs: unable to parse mount options [ 794.520419] hfs: unable to parse mount options 06:40:57 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x33a, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48002, 0x0) 06:40:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x223, 0x0) 06:40:57 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:57 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xff0f0000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x7000000]}}, 0x1c) 06:40:57 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xec, 0x0) [ 795.013146] hfs: can't find a HFS filesystem on dev loop6 [ 795.041823] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:40:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x4) 06:40:57 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1a00000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)="2f6465762f6e626423f6", 0xffffffffffffffff, 0x800) [ 795.070434] hfs: can't find a HFS filesystem on dev loop6 [ 795.079640] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 795.100989] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:40:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x16b, 0x0) 06:40:57 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x600}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:57 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x4000000) 06:40:57 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x4000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 795.280156] hfs: can't find a HFS filesystem on dev loop6 06:40:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xaf, 0x0) 06:40:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0xffffffffa0010000) [ 795.330957] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 795.358428] hfs: can't find a HFS filesystem on dev loop6 06:40:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)="2f6465762f6e62642304", 0xffffffffffffffff, 0x800) 06:40:57 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x28010000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 795.380267] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:40:57 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x2}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 795.483754] attempt to access beyond end of device [ 795.488840] loop3: rw=4096, want=136, limit=5 [ 795.493404] gfs2: error 10 reading superblock [ 795.535178] hfs: unable to parse mount options [ 795.541916] attempt to access beyond end of device [ 795.547173] loop3: rw=4096, want=136, limit=5 [ 795.551746] gfs2: error 10 reading superblock [ 795.569687] hfs: unable to parse mount options 06:40:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb000000]}}, 0x1c) 06:40:57 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4442}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x1000000) 06:40:57 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x92, 0x0) 06:40:57 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x6c, 0x0) 06:40:57 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x13000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 795.928782] attempt to access beyond end of device [ 795.933990] loop3: rw=4096, want=136, limit=5 [ 795.938556] gfs2: error 10 reading superblock [ 795.946267] hfs: unable to parse mount options 06:40:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xee, 0x0) 06:40:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x20c, 0x0) 06:40:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x1a0) [ 795.973014] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 795.983211] hfs: unable to parse mount options [ 795.994054] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 796.009994] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:40:58 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4d50000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 796.032398] attempt to access beyond end of device [ 796.037441] loop3: rw=4096, want=136, limit=5 [ 796.042024] gfs2: error 10 reading superblock 06:40:58 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0xf6ffffff00000000) 06:40:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)="2f6465762f6e62642302", 0xffffffffffffffff, 0x800) [ 796.124072] hfs: can't find a HFS filesystem on dev loop6 [ 796.174068] hfs: can't find a HFS filesystem on dev loop6 06:40:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x6405]}}, 0x1c) 06:40:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x132, 0x0) 06:40:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x21d, 0x0) 06:40:58 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xea03, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:58 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4c00}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:58 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x1a0ffffffff) [ 796.835554] hfs: can't find a HFS filesystem on dev loop6 06:40:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0xa0010000) 06:40:58 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xa00, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 796.882611] hfs: can't find a HFS filesystem on dev loop6 06:40:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:59 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x10000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x900]}}, 0x1c) 06:40:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0xf6ffffff) 06:40:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:40:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1c5, 0x0) [ 797.010522] attempt to access beyond end of device [ 797.015555] loop3: rw=4096, want=136, limit=5 [ 797.020132] gfs2: error 10 reading superblock [ 797.033386] hfs: can't find a HFS filesystem on dev loop6 06:40:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 797.093007] hfs: can't find a HFS filesystem on dev loop6 [ 797.101800] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 797.117214] attempt to access beyond end of device [ 797.122232] loop3: rw=4096, want=136, limit=5 [ 797.126801] gfs2: error 10 reading superblock 06:40:59 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xa9, 0x0) 06:40:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)="2f6465762f6e626423a0", 0xffffffffffffffff, 0x800) 06:40:59 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfffffdfd}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0xfffffff6) 06:40:59 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x4, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xe6, 0x0) 06:40:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x122, 0x0) 06:40:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x400000000000000) [ 797.321798] attempt to access beyond end of device [ 797.326859] loop3: rw=4096, want=136, limit=5 [ 797.331418] gfs2: error 10 reading superblock [ 797.337840] hfs: unable to parse mount options [ 797.380179] hfs: unable to parse mount options 06:40:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)="2f6465762f6e62642303", 0xffffffffffffffff, 0x800) [ 797.413935] attempt to access beyond end of device [ 797.419009] loop3: rw=4096, want=136, limit=5 [ 797.423586] gfs2: error 10 reading superblock 06:40:59 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x170, 0x0) 06:40:59 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x1f00000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:40:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xd7, 0x0) 06:40:59 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x2000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:40:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x100000000000000) 06:40:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)="2f6465762f6e626423ff", 0xffffffffffffffff, 0x800) 06:40:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:40:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x400000000000000]}}, 0x1c) [ 797.954314] hfs: can't find a HFS filesystem on dev loop6 [ 797.959241] attempt to access beyond end of device [ 797.965016] loop3: rw=4096, want=136, limit=5 [ 797.969574] gfs2: error 10 reading superblock 06:41:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xc9, 0x0) 06:41:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x200000000000000) 06:41:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 797.994810] hfs: can't find a HFS filesystem on dev loop6 06:41:00 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x100000000000000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:00 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1cc, 0x0) 06:41:00 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xc96030000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 798.040717] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 798.060819] attempt to access beyond end of device [ 798.065823] loop3: rw=4096, want=136, limit=5 [ 798.070396] gfs2: error 10 reading superblock 06:41:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xd6030000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x2) 06:41:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)="2f6465762f6e626423ff", 0xffffffffffffffff, 0x800) 06:41:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x206, 0x0) [ 798.141615] hfs: can't find a HFS filesystem on dev loop6 [ 798.177599] hfs: can't find a HFS filesystem on dev loop6 06:41:00 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x40000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:00 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffffff7f00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xee030000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x1000000000000) 06:41:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 798.356599] hfs: can't find a HFS filesystem on dev loop6 [ 798.412918] hfs: can't find a HFS filesystem on dev loop6 06:41:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xbe041080]}}, 0x1c) 06:41:00 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0xffc99a3b, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x2000000) 06:41:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x2801, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x113, 0x0) 06:41:00 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x53540000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:00 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1b9, 0x0) [ 798.896987] hfs: can't find a HFS filesystem on dev loop6 06:41:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:01 executing program 0: pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x3) r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) pkey_alloc(0x0, 0x1) 06:41:01 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x14, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x90, 0x0) [ 798.944234] hfs: can't find a HFS filesystem on dev loop6 06:41:01 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x2300}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:01 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x900000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xffffffffffffffff]}}, 0x1c) 06:41:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 799.110904] nla_parse: 20 callbacks suppressed [ 799.110916] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 799.142068] hfs: can't find a HFS filesystem on dev loop6 06:41:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x68, 0x0) 06:41:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x82800, 0x0) 06:41:01 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xffff1f0000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 799.204899] hfs: can't find a HFS filesystem on dev loop6 [ 799.212967] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:01 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x500}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd7]}}, 0x1c) 06:41:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x51, 0x0) 06:41:01 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0xffc99a3b00000000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x5, 0xd10, 0x6f62, 0x8d14, 0x2ecce4ef, 0x1028}) 06:41:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xe4, 0x0) 06:41:01 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1e00, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 799.420654] hfs: can't find a HFS filesystem on dev loop6 [ 799.432720] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101400, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x3ff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e22, 0x75e9, @loopback, 0x7}}, 0xfffffffffffffffa, 0xff}, &(0x7f0000000240)=0x90) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) 06:41:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x2f00000000000000]}}, 0x1c) 06:41:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x175, 0x0) [ 799.484587] hfs: can't find a HFS filesystem on dev loop6 [ 799.485603] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:01 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4000000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:01 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xb00, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:01 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x1400, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 799.607897] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x804) 06:41:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x5, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 799.650213] hfs: can't find a HFS filesystem on dev loop6 [ 799.694660] attempt to access beyond end of device [ 799.699920] loop3: rw=4096, want=136, limit=5 [ 799.704497] gfs2: error 10 reading superblock [ 799.712171] hfs: can't find a HFS filesystem on dev loop6 [ 799.722844] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x117, 0x0) 06:41:01 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x1a0ffffffff, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 799.748852] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 799.767720] attempt to access beyond end of device [ 799.772773] loop3: rw=4096, want=136, limit=5 [ 799.777393] gfs2: error 10 reading superblock 06:41:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x150, 0x0) 06:41:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x802) 06:41:01 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x60000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:01 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0xffffffffffffffe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffdffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x8000000000000000) pkey_free(0xffffffffffffffff) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000140)=""/150) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x5512, 0x260000) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000280)) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) getitimer(0x3, &(0x7f0000000080)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xa4001, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x80402, 0x50) 06:41:01 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xd00000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 799.860669] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1a4, 0x0) [ 799.904842] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 799.927436] hfs: can't find a HFS filesystem on dev loop6 06:41:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x803) [ 799.965455] hfs: can't find a HFS filesystem on dev loop6 06:41:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5455010000000000]}}, 0x1c) 06:41:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x71, 0x0) 06:41:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x0) r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:02 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0xa0010000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:02 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x7e000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:02 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x12d, 0x0) 06:41:02 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x68}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180)={0x5, 0x6, 0x9, 0x3, 0x1000}, 0x14) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000140)={0x680f205, 0x8, 0xe7, &(0x7f0000000040)="a8683e4234a6de8d1c328f41cfc1e00a2373127803231eb91eb0f732805ddc0303d21d8ac9d3ea18d9fbaa4f4f18288f1fb65e5e576e1098caa6a97f195facea963b744aca70183983b762d3e69b2367249fef1c52ed32525e701bc401c0fa9e5f80ac1d99fb15cfe6fa6011d01b5a914a1e745280667896ffdd4207bea2af516809f4414b0d32befb6130bbe41b9d79c15389b0a1210479440b082b073981be5ac6303b96eb4bcb2ea2b7c5453782f11ac5910f11d2213dea6947798a68a3da3bc11a22d90e258d8493a0085f7d05508c4eeca933318fd9e2854005c5dde6100ff3a795b3e0f3"}) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 800.445019] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 800.457402] attempt to access beyond end of device [ 800.462402] loop3: rw=4096, want=136, limit=5 [ 800.466971] gfs2: error 10 reading superblock [ 800.476201] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 800.476839] hfs: unable to parse mount options 06:41:02 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x2002) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x40000200, &(0x7f0000000040)="de7fbd34eaba936ed8fdfc9168b2600582f9c3a27eafa5629f6e22c56dc80cf00f9f5b475296a78c7388d2d44b53564b73b35eb97da3c07eb971396a32af2e38d77e5b9c3ff858af01803238b2a4943186f48e0c05c7bd6f5a11f86cd4ef6f3ce23747f846758e84f12bee90c1160caa70e91fd4b8f69af12daee757ad0989f649829e374d832f506ffd70cb4a", &(0x7f00000001c0), &(0x7f0000000240), &(0x7f00000003c0)="afd7f09d7cc306b595d7899d9dc9a3e43750ce8468713f37190e1bb6ec79387a8510489d5ae6f43dc90d15d98a27a1a882570987fad22c38bf9f46fc474dcdda42bf43f2b868a27b88ef2cdfad79b4c8c2d01789e9a34b76d6a5d195d56d09fe01e59704700585d5fb9d49662d5c839a1247f1b8a5e589e622e83246c04a60c99796309409e286018c1c48c711b87393918d49272fbec14b59b801e113d66028d8dffe") ioctl(r1, 0x8915, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000100)={0x2, 0x9, 0x319, 'queue1\x00', 0x800}) 06:41:02 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x4d, 0x0) 06:41:02 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0xa0010000000000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x77, 0x0) 06:41:02 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) readahead(r0, 0x2, 0x1) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x0, 0x0) fcntl$getflags(r1, 0xb) [ 800.520076] attempt to access beyond end of device [ 800.525161] loop3: rw=4096, want=136, limit=5 [ 800.529726] gfs2: error 10 reading superblock [ 800.552337] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 800.557600] hfs: unable to parse mount options 06:41:02 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x16000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:02 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x7fffffffffffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x47ffe, 0x0) [ 800.676747] IPVS: ftp: loaded support on port[0] = 21 [ 800.733167] attempt to access beyond end of device [ 800.738437] loop3: rw=4096, want=136, limit=5 [ 800.743020] gfs2: error 10 reading superblock [ 800.766302] hfs: unable to parse mount options [ 800.793187] attempt to access beyond end of device [ 800.798226] loop3: rw=4096, want=136, limit=5 [ 800.798230] hfs: unable to parse mount options [ 800.807401] gfs2: error 10 reading superblock [ 800.862452] IPVS: ftp: loaded support on port[0] = 21 06:41:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x88140400]}}, 0x1c) 06:41:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xda, 0x0) 06:41:03 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1cb, 0x0) 06:41:03 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x1000000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:03 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x20000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x100) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) dup(r0) 06:41:03 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfffffff4}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:03 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xfdfdffff, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:03 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x5) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@int=0x6, 0x4) [ 801.409214] hfs: unable to parse mount options 06:41:03 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x9c00, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:03 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0xa00100, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x9f, 0x0) [ 801.451739] hfs: unable to parse mount options [ 801.467031] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400000, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x501000, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000000000000010000400900000008000000091200000900000000000000010000000000000000000000000000000000000000000000"]) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) pkey_alloc(0x0, 0x3) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000100)=r3) 06:41:03 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xff0f000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:03 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x4009c0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x2) 06:41:03 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x14000000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:03 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x12, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 801.664541] hfs: can't find a HFS filesystem on dev loop6 [ 801.722904] hfs: can't find a HFS filesystem on dev loop6 [ 801.732234] attempt to access beyond end of device [ 801.737315] loop3: rw=4096, want=136, limit=5 [ 801.741880] gfs2: error 10 reading superblock [ 801.795300] attempt to access beyond end of device [ 801.800433] loop3: rw=4096, want=136, limit=5 [ 801.804990] gfs2: error 10 reading superblock 06:41:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x4) ioctl(r0, 0x400008912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e21, 0x8001, @mcast1, 0x3}, {0xa, 0x4e22, 0x9, @empty, 0x66}, 0x3ff, [0x625, 0x2, 0xc5, 0x0, 0xfff, 0x100, 0x7]}, 0x5c) 06:41:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1c7, 0x0) 06:41:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x1) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x400000) recvfrom$llc(r1, &(0x7f00000000c0)=""/36, 0x24, 0x40, 0x0, 0x0) 06:41:04 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:04 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x1a0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:04 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x4800000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x564]}}, 0x1c) 06:41:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xb4, 0x0) [ 802.351240] hfs: can't find a HFS filesystem on dev loop6 [ 802.379334] Unknown ioctl 19585 06:41:04 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x3f000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x48003, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x1f, 0x2, 0x3}, 0xf) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) r3 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f0000000000)=0x2, 0x4) [ 802.404912] hfs: can't find a HFS filesystem on dev loop6 06:41:04 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x3b9ac9ff, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5]}}, 0x1c) [ 802.478121] Unknown ioctl 19585 06:41:04 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xeb090000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x18a, 0x0) 06:41:04 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x3ff) fsetxattr(r0, &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='\x00', 0x1, 0x3) ioctl(r0, 0x8910, &(0x7f0000000000)="0a5cc80700777e68c42025af582061beafe044edd0b23d591868338559fe0bbcd8002cdcbf76fe919ac26edaa40f00687e7071ce395a5e89df0556d65af08e93f7df42151cf8b6bd3dd8277bc140082c73452199ce67ebd614883d99cc2e2fbced800e22ed4dc90bf9631d8565854620a64d314d0f25527e3afd357b3fb6aad7291e8514a8d87fd4734d58020d468090b6cc75df8752cc050d94e4b2e33641416f9f0da0e8eb31") 06:41:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f00000000c0)={0x2f}) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 802.544660] attempt to access beyond end of device [ 802.549712] loop3: rw=4096, want=136, limit=5 [ 802.554280] gfs2: error 10 reading superblock 06:41:04 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x4000000000000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 802.607478] hfs: can't find a HFS filesystem on dev loop6 06:41:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x2000000000000]}}, 0x1c) 06:41:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x26, 0x0) 06:41:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x2) r0 = pkey_alloc(0x0, 0x3) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$rds(r1, &(0x7f0000000dc0)={&(0x7f00000000c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/183, 0xb7}, {&(0x7f0000000240)=""/177, 0xb1}], 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000140100000c0000000400000000000000580000000000000014010000070000000400000013000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB="dff0000000000000"], @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="0600000000000000"], @ANYBLOB="1400000000000000060000000000000003000000000000000000000000000000180000000000000008000000000000005800000000000000140100000700000081000000e0ffffff", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="1a09ffffffffffff0b0c0000000000000100000000000000000000000000000040000000000000004f000000000000001800000000000000140100000c0000004ad2000000000000580000000000000014010000090000000800000000100000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB='s\r\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000e00)=ANY=[@ANYBLOB="ffffff7f00000000e6c7b7c36b4e150b27d56b4f3f4e2a031c691100ebc53cc45a341c135e4dfeaffa026c4ece1c20d7d2586b35de04085cf83ee6bd21f813167897159747a37476f638263138d581413b9b5e4e156cefe7819c8ee0ccf105ca5728c10bf81a39e84c16a36fef8baa87f5a886b6db4c51d906665b"], @ANYBLOB="01000000010000000800000000000000070000000000000002000000000000006a00000000000000030000000000000058000000000000001401000009000000ff00000040000000", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB="0600000000000000"], @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="0600000000000000"], @ANYBLOB="01000000000000000400000000000000010000000000000000000000000000006100000000000000070000000000000058000000000000001401000009000000ff03000000000100", @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB="0500000000000000"], @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB="0100000000000000"], @ANYBLOB="e5000000000000003f000000000000007a0600000000000003000000000000000300000000000000d904000000000000480000000000000014010000010000000000000000000000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="bb00000000000000", @ANYPTR=&(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='6\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='_\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000700)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="c000000000000000", @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="a100000000000000", @ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="d300000000000000"], @ANYBLOB="0500000000000000010000000000000004000000000000005800000000000000140100000900000003000000c1000000", @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000a40)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0600000000000000524df080ffffffffffff00000000000006000000000000004a00000000000000000000000000000030000000000000001401000003000000", @ANYPTR=&(0x7f0000000a80)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000ac0)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="1000000000000000"], 0x2b8, 0x800}, 0x4004000) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 802.670784] attempt to access beyond end of device [ 802.675849] loop3: rw=4096, want=136, limit=5 [ 802.680427] gfs2: error 10 reading superblock [ 802.700157] hfs: can't find a HFS filesystem on dev loop6 06:41:04 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x1400000000000000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:04 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x7000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 802.805439] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x31, 0x0) 06:41:04 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x1) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1e, 0x0) 06:41:04 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='posix_acl_accessB\x00', 0xffffffffffffff9c}, 0x10) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 802.897213] attempt to access beyond end of device [ 802.902254] loop3: rw=4096, want=136, limit=5 [ 802.906806] gfs2: error 10 reading superblock [ 802.911844] hfs: can't find a HFS filesystem on dev loop6 06:41:05 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x4, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 802.976287] hfs: can't find a HFS filesystem on dev loop6 06:41:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xc, 0x0) 06:41:05 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/uts\x00') setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000080)=0x1, 0x1) msgget(0x0, 0x100) 06:41:05 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1c9, 0x0) [ 803.039252] attempt to access beyond end of device [ 803.044260] loop3: rw=4096, want=136, limit=5 [ 803.048816] gfs2: error 10 reading superblock 06:41:05 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x13, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:05 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x14c}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:05 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x1a000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x4e, 0x0) 06:41:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x8200, 0x0) 06:41:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0xfffffffffffffffe, 0x5c, @mcast1, 0x7b84}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r1, 0xc9}, &(0x7f0000000100)=0x217) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r3 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000140)=0xb7e, 0x4) r4 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x1, 0x400) ioctl$TIOCEXCL(r4, 0x540c) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r2, 0x1}, 0x8) write$binfmt_elf64(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x8cd) 06:41:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1400000000000000]}}, 0x1c) 06:41:05 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x71, 0x0) [ 803.629779] hfs: unable to parse mount options [ 803.644753] attempt to access beyond end of device [ 803.649817] loop3: rw=4096, want=136, limit=5 [ 803.654932] gfs2: error 10 reading superblock 06:41:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffff9c, 0x50, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r1, 0x4) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:05 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0xffffffffa0010000, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x114, 0x0) 06:41:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x408d12, &(0x7f0000000080)="0a5cc80700305f8571507025d26df566d8f2d68b584d39984254817a7a1127029b15a6169f3930d132264df37f836d72a34b92cdffadbdae7d3d584b4104428d3d950448cc0cc3c7e60cd744adfdc900519b99cd2953bdb42a804b8dc008f557f6a54450707db96ea0bae7008f3938a910bfe73634957912687ea2481e407e371c75d22f7550f1caf6b9badf116ec49d1227f75c0d3f8fd4eafb6122bc29eefe81eb7e63bc2b620da5b00388bf308d68d50a48090e") r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x2) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000040)={0x0, 0x106004}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='uid_map\x00') write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000280)={0xe, 0xa, 0x72fb, 0x9, 0x6f, "63dd9a332c216cc0371330db4079d5e492dd4dd57e9368cc0d62c467f983740bf4661293feb7d96bd83bffff90aba9fcc3d6fb48364fd96db86547b60400ba8f098fc204e17746343002e94835f8484e39d354ea58800e777b841ca9bdb5cb466b3362270d0f9cc7e6620b86b9a55a"}, 0x7b) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x80) r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r4 = add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)="8788027dfbf1eb4a586cae70b90ce592200569fad8c8823b56be710a223157cdcc6696b5324bcdb46273f81f3a80d42bdba9624fba96de26d26aea325002f2e8530a03636226f91f8780e03cebf460325fe40e743f247eacabd98c8a95e8ab5a5ce5ed33902f3d61825f51f0e54dab", 0x6f, r3) keyctl$invalidate(0x15, r4) [ 803.697944] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 803.710719] hfs: unable to parse mount options 06:41:05 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x161, 0x0) 06:41:05 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xeb09000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 803.804680] attempt to access beyond end of device [ 803.809849] loop3: rw=4096, want=136, limit=5 [ 803.814426] gfs2: error 10 reading superblock 06:41:05 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x4}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 803.870876] hfs: can't find a HFS filesystem on dev loop6 06:41:05 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1400000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:05 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x101001) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000000)={0xff, 0x5, 0x1}) 06:41:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x201, 0x0) 06:41:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='coredump_filter\x00') sendmmsg$nfc_llcp(r0, &(0x7f0000004580)=[{&(0x7f00000000c0)={0x27, 0x1, 0x1, 0x0, 0x1c, 0x5f7, "3180af9899f9447de5fcda036d50d14970d06946080fcf67d8c66dd82437e9f2b03935e88f6cfe19d21d991c5a1c94ff87acdb5c25915e3779c9e09868d30c", 0xf}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000140)="f082bd0c22cef8aae89b91ddf3343b944ac810513aee2a2b8d99eb40d757e50cab907dfcea92e07616ce4737f3da1672886a2d97f40de67cabca27dafb09f8bd9ef93f1bc2b4c9c09ed9431b9be63cc863e98a652122ad430af03448932f4bda99b9894ef01b31cd1016e02a685beeebaed322008e20f7374cd6721249c4b634eddc07dc548c60162b91cefe9b8f3323518020e21884", 0x96}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="980000000000000011010000018000008ab6feeb896043207d05321add757347642e168abe415dd23b6b5b815477eddeec063aa312429644020342fd1cab63acb49e6fbb66dd71453cb985563ad28442d76ec3ea74ad4de5564946dc6aad14d589e8eb763c6bd1df17103a2999bb30b8af9eb960e6239aca2ba1453b0cff7eb98475cfc504fe47be2c47c0548b785e90c21b613bcedba962"], 0x98, 0x20000041}, {&(0x7f0000000340)={0x27, 0x1, 0x1, 0x3, 0xee, 0x4, "f434ee295d42b3d318c7fe8568a3d2f7d7578611271ee1f6ffa13ac32135895632a76e7ff051f51dcd766d5c59c0433e41f9550a7f450233d40ee409704c69", 0xf}, 0x60, &(0x7f0000001940)=[{&(0x7f00000003c0)="0a46c47f817ebfd8f2d897b2d82a88f9621e37e33dfbaaa6324baad9a8cd88ae3969589ebbd1eeb13295fd89d3ee32a84f", 0x31}, {&(0x7f0000000400)="91ee4d097fa61b523e12b5cfa177b17372115955433f4c33bb0a15e188a8b4708d9d7d649603825dfa70298df9bf46e881e21384d2f7ad36bb21a84917a34962c59b8ab8f1fb59bdf1c5a10f74ceb10434568fbc643fcc68e7534a2d7f14df4b3fa221c1a5f0250a54718f36c1b1cdef3e27b09a9aea1ef29d67cf3b516864127ccc3bfeb8886d5ec75b843f70bc100344e048d2282264f28c7be36901ecb093306be2172fddf733ca7274fb8bcda3984b589e699a489663da604b656b7b43d56c0d661bf45f033ce3fc73f0d098d230eb427d3377db80a3542e43d2522df3078a71b208", 0xe4}, {&(0x7f0000000500)="724c91b3d7e97e4f05f454dcd50f8e3a96887cef883d5a618fea924300fbf74c3277b0", 0x23}, {&(0x7f0000000540)="db67a50f23bd4ba50fd93ea3be3297e725efb148ecc046009219e7cc95f4383a1e2e3f268c8807c5d924ff622c8a06026c07ab4402368b72b0e3b3715e34ebdf5ca64da5c2b7361c9eb0f82cad2b7e80b90b6a898b906240a6173a2bd2c8f87a646a28911c0ccfd57a7a0df6caadfb08a1c9de2968c16bca529abcabfd4df2d61b940558b8d93a7d710de32d8d6082872ee857c3996cc130b8e58054c74abe12649ce6b7d73eb5a41dd74c2e01ad79ed1fe639e9ad78bea6f47e2a26f47e9dc07f5f7888e2459145bc35dc03164a600729f517e8e0776b5dd41d34776cf54158bbd0c5ff61c93819934105694c32ee9a0bb3d95b26fb4a54ffe030b356", 0xfd}, {&(0x7f0000000640)="961aa5ce2b8c980b7a3c4f654bbeda186d28d0df28feb19080ff1ff711f03ddeaca5702f07c5b21e9844f111558e575671026c3ad132bb5370b3cccdebdbc46f5a0bc37c32b469216f3ab7a1a40784f26e40383bf2cc37dd38f0ee0ae27dcdf5322d7d7be2e0d3a18cdad24441b350a02fd4f8c50f80a3d357d8747e1f57a7bb4e8a4ac13dec9362778855de54476496207e59a1e271ca36d62fffa8ce9cd45138321dad5355d000fc20cdd49ef5c9d3f1afdc88d998e3a6c9282bbdbe386e2bbb0e2460994812a9c4e71c91f530d0062591dc45c4e1fd1ab31afd388856ba1c172c39f731", 0xe5}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="e1e4354cb51d294e111b63482ef7fe78f9e5342d3d55e3b3d14f92bf6659e014cf9be7aa5a304fd73482f4b6d2a7506b027a4353cf812dcdc5f737910e2acf5e7651692b7f49ec37973de8ffd6b0f711f999ef3467fd6d82ad75c0e15e803186d09ac0a29282643e9767ac057bdbffdcef92009b19180a25d0b6b109247be8c1a5012614e97f6e8f2e144e7f45a20b218e3af209d6ce15cd5412809b994d01eba723270c5e7a47a3b57855b8e14e6e8f6eb362126233bbabd81c71816741eb2c78bd9dc5dc0952ecbbd363a15d5cc2a702af65e96a7f36694402dc720f0f080c18dd51d4100aaf1aa375e1ea1a075b779f8a86fa", 0xf4}, {&(0x7f0000001840)="93ba9d6ad6897256a88e824896eaca47fcd52ab0f293f64e5f0cbafd5ed67e12dad303d9c1d0fc70a27c1a5403caf6dadb43a64ced5ae4643627d518f2827fb44fad048799bcf3157808af1d74bbd94d5701dae2de9ed32483697b5d0d892e559da9465813e09f40cfdbe42ab7d8a7b82f8a42192c721d9e67045813df7aaf7eecb56e3702a38ce3caa3cc9c5cc29f890f3995f90d265d74be5003405eae1e703a0b5f7b1f55be2fb55502f55ff5c98d7f7c80c13d513fa678a8a4756a71f12b9160bb69531df40d3cf0928337272b21b2fab824be97048d84cc", 0xda}], 0x8, 0x0, 0x0, 0x10}, {&(0x7f00000019c0)={0x27, 0x0, 0x0, 0x4, 0xff, 0x8000, "6339396e36a8b9ffd66cc14824f712b1e3b199652b32f4cbd01ecfb9f5c0a4521e2e68355747898908b2a3b2581ed08ba0c769ac637502c32d0bf98d5458b1", 0xb}, 0x60, &(0x7f0000001b00)=[{&(0x7f0000001a40)="78d0ad8a16f6544d23c6349a44c67376086e31b8d43bbd3dbee2eec706689fc7122bb37c66b80c8e860bdf183ab40f12670cbb5a897f1d017f8653316e03eb036e0fc986b36fa92409aaf4f7e545e7206bdef06d4f0770260838f6", 0x5b}, {&(0x7f0000001ac0)="b92fc0a89b550778f35f52cf4dcf294f", 0x10}], 0x2, &(0x7f0000001b40)={0x98, 0x10f, 0x9, "c67613694708ecd630c3f90dc1e42f1dd1fccef12d9d4f3251f269abc1483a80c53386f36bb510e01fed3f6ced4099fce59f5a86f249bbf162b2a40ced57a2a1cea38fe87211f294802e1e1a1b1b88ddc5166d62e9cef403d0cf2e236518db5057abb26896fad90ce27b77b6bf8cc5f7ff4a38eef21c23e8c162d26813d678b4708de0"}, 0x98, 0x10}, {&(0x7f0000001c00)={0x27, 0x1, 0x2, 0x7, 0x4, 0x6a, "b62e8effecb0d0b4314dd4c065fd9d913e8d4f6992ce5f827b8195550913dc5ee7969e30cb0b5b63ea8959441bde86edc41933b8f643e0fdbf6cff94635bdc", 0x7}, 0x60, &(0x7f0000002ec0)=[{&(0x7f0000001c80)="25666dc7b8eefd38fe4ed0073ff2101cab0d79fc0f041593d77c0e69d43e5beacacf2749c2b76bc3e531300f657013e874c96a4ef03cd9418b8763b9e7a6ae3e1536c6511ad3801b2b4dbb8c42fec9b23aa150e5e8134970df3366493f96491a77470453e4031e26e0ea886e39109619b6a9f19910fa16b5ca", 0x79}, {&(0x7f0000001d00)="fc1c68d523027df9088a983700e973adb050d5179233abdccdb2817a4eb58fbcb3b9742031f3938d4ff97de2335e605ca2de6d92731f329af6d2a6bcf12864fa9002c811a7fae5dec455935a80ac2e55e527fcbbd7dd7209b0f6af0e19f030fb7ac3f77d44c26002a131b698d7e8bd8889580c25dc0c9f94ae3378da0f88051a0a14970432730a6bca0efd01832c66a832b3a363e1c52d7ff26c6b63f10bdc57121f0a4bd0bb1fe108ca5f9f12f57e8df0286fcaedb6d395598b3d1f338f553aba5968f82d5cead62de0a92848fcae6cf2dd62994ecf6587fab52888931eac0e5c8fcef2017ed8ad424c5f83651c958707c25cc02de18e0c3fba33e120eeab6c9e56e193e8a8d78ee8424b091f76499b1b7ce29b5b166e320ae9aa85776dd6b446ad3574721825f498be14341f5ba3e65f558817b01a65a480e479ab014d7a7ce47fa48400d508018ff9a276eb148d7cd5e05974c31090dfb7d1380fd2376cbb1adc2646f3c6cf8f2c98b811e0810407742f33855e59c47d07dea0b2bff91b664d62cc55eab5ba4c435873bc8d70b2ddb027f1c1cb417e6b3e803c8b006fdc375c6301782446c3cb1131fabacd83d93cda8ea09fa0d9cffc3fef61fecfdd00daf1dab1c90e099459821da571d72ad336377ac5678d90b7c61b59271851324b73484f5788ffbc971e75f8ed27d76425ec006cab7a007b7ae7b158df370074856ac563ac278f542a50c3ab7e191250fe10ddb13f565c52f7c7cac184d690822f3141cabbf8d2226888068a05d5d333f918b3105f6f16c2fe0d08e12ff36886a5e27da86fff5fb46d4aa89e0a599589bcb38c7b995b2df16f18fba6af6cfe3ef589993db67d764109996a4f0838f846e41d0beff4b9799ea29d41ae1306c7703eb8c1e8506478f1e7137685c1d4101f55be45baf43f741c50b11eea1565e5f26b43df793999bbb11f43c1d2dabd382ec4c25f581ed855975073c1c03f14abfe7f54ffd10ce56201dc702df68838e68c658932feff8ed5ad9d438dfbf7b5f9dd44dd4bcf7ef8db97fc81d4185aaa44b8da7d26ecb3384d2d3c8a8ae05bdf32b4bb380b0bb87c35205c83b211f7f12c7e017592352d9add63ea83dc01cab1a8678bb86a45a96cb2462924a774eacdd23eee220fa3630ac837a9633d2e1398f47f4155a8810261eeee6f415967649510fd0daca5da689ce0edc1ad04dc802a4841f65a0a6d0e81040480575b46afcee348d911067cd91194e574138215d57fa5cefa2bca416366d29f933a5c56e333626a579d0d4900007fde9567f7ef30c2228b9b3a3ee93ef5157c1ddfaac1600079726f402439edfda94c91d714f9e1adf5a5eade9f869f129e24277c0c79d21f95af06f38332576a3f267fe44fcda8473102f3b2ebfe53ea4390fae19c01b88526acbaf5053c904a3a5a033b0211a45a1921ef37e12764d87f11f84dbb849b29620cf095c6abab5856041d9c73130fc6ce2c58f35043fe3ca372bd6da08273a2db7b9ec2322fad36fd6a0d447dcf8c3bff1db23671662b63c65f551f5b2b55eafd196b42c254fb03dd69d6219a399e64099567d2105101f8f10a3e855982f5927b4652d30b49c46ad4fbcc4b19df1d3f5012791bdbc274ab33fc6d7a9e88eaa8b29fe7ad3b2ab17a28d1ad9b1b8b4a4bb9084cd5467c485fb4ec283e060249c64cde3e27b5d7456ce684951985592e5f3f6ffc087edab6633eb2e6fb261c32daf3dac2f5ce933f18b141c2682b20809990d468c7dcd397d05b263af56910a2b96686c0386de03ec707944119ccb1669d7791ef996e3ed54cfb5a9dc40ddccfdc89dee34e900000b96fcf85ba0dfa984727e260ef67d2910d5a32744a92fb4bf65334b68bf150d1d4e941b64a6898376d7f1f59e991b12889cefaece15dd779d1f4da9bd823259f799002eae0ffb60a889eb851774d7ad031243aed8932912acae30b0bf9073debdf5bdb8d1a8723349efa06ffbc19b5b576b1fd1f74bf03acf07e3f3588be3ecc3ce3dd60aaa8b220de28f4f4902f3e8ca0689813070380205a48c7b5f1afaf19294d76992d1a862d910842384895c359497167dcf160352811a71880028558eb4a48b2c66910fc9cd7a9ee058d3732fa12b7447c1ebe0e53e203e7717511ddd316aff18e32e59ad3c44402c0fe22abd553442474ecda2cb2df0fe6d114d35b3b7e998c31b1beef8ac48273bd82d42f129fde964c9133e01a2ef72dd5e322be3dd034d917c4183b427cf846e7a28a443a1565e423524b201d5d1a3a145e2622fb62e3d235eef3013293f3e4127c0087fd1e8a8950a5659be06d948f4e1822f9d3273541d6609c4258f9f73cfe5c3d067a8f5219482e9cfbc60f1a98c932ecc6ecb3e1be429d434b3fac0d3076a6efeaa2939c38fcbbd6fe9c1df89436b7e42b4269093fb9ad40a2e52af0b099c543b1a70b338bfbf3b01019a9d85a164491592e2d443db2f5d07d74792421335bc5f9031f47b62c64f1fba54f77919b41b8e8ac23e465e098aa08590dea50bcb8f25a3c8802d72f95352e601fa2822a75d66717bcd7d93efa46098cf14e0bef50ee89bf7a31808758cdf0ca7d9e44698b161447c3e0a1ff78b2b379aa025ff5b2b7b98f98f66fcf80d4baf4a903b97f5482c80c41aaa6fdef04b2bd95ef0ad4829dfb6ff6bc809643cbc2debc72d632a27c00416dee0f435d9ffee2074ff47eb5eab3072d5aaa8b695be838ac2dadc7efac0fda63d00863b1c6d468462f73825be3144fbbaecda09f75bc1d3387a90999cc8e6432968618fc72e0873bd64a0b8431b55c66a4f7c8eb3f6a6dc835fca9a1032f9003e6c1a68317e4ae14b0d7162ffa47d0df2b64b171f97d6df3b859aaf2999136e6fda860d51612dacd436b21cb80458815bbf76ce318cb62a2d4a0426c670b8389ff9c05491c62c06961dbcbbf392fb18823b4cb9e2f6e1a340acf0e74a8dad4072df8e998546ac8736ca4d2a0bd1027ff085dbfbe8605967d9274d5078f8bcf3e8985a1b41aa77e38abc4b8a1ff581b50661e93d81cb691cd7cc01ea7ded97a0882ee325432558660302f5907d18e9f20043aa1773eba2cd93525d8a17427843b07716ea4a59e6431f3144f5134e7253f48f35aafd1e331838144d2a87dde77338de3bc93a1a750101799250921caacefbce62b7d97524e1bca25622e7d05dc91a87b57652e976464043358e7a77dbee31d2fef427eddf3c8ad790a02f5e6fbb29d6d01f4bd382a7b232f0099dd3c24d31ff96337d4b330d2617a2306f6c2ae925474a4ac86fef553536e65861d0f16b715fb8fb559350b98c377205c19675df5c6d6a99b1ca3e73f553e2ad36eacfa1cbe595cda93fab93f0407e68a8969330b64e9f56ac7e01381ce4f2dc761cc14d216b81ad6e27bc721bbd53a8f081715f32aa418d9e1a8a8e0d86b110c319d53ac890a460045fdd325a59aba6f1c195280c103b3532bb7652f392bd8905a04c07aabd6f2435e994768eb7268d21a4029cfe646e25e618f79208d55c76fa4edd534b4242687568064c2e64a3ba20a62379bfeff44cb7b7a5a9e1049da4de18432363c34e4b34d66449112cc2305f682e18fec80e1b616e723223b2fd4ed1745a2a9803e0d76b1da6cb1242dc9cd28426ebb5937f5d5175bef061c6cfe54bb5329538a1d60e417f3c62a4ffd1068b5ae13fd79bb7ea799084abb70daa71aa3ea46885a7747a3198997a0980031c465a593f7c41f2f73ed6dc7fdab26d266d0127fee03d1cc0e352a83e72110bc95d3e555136f1b023639a2e529fc869573beb9a039a8f5434747fcdcb3afe7e0b9e706a580a472a39b6a0d703fc9783b788044185bdd81c23959c135f8a40e32671b2a4249004c8a0deaddd2f32ca313682b369090ed791efe15f35cf5e1acfda5481ef65822e67959dddde195f240520c31a9833bd5a0778286a8548fc4e9ea4f7566c03aa8aad88a52b29737a6621e57ed1bc129824630b29a486aa4660ed852cc8e792f8c3cd1af1e02ea844b4a36ea97d5312ba185b58d286677ba2c7e9b7c5998e5d1cee1828e7b7b57cb5ea7e4b8e67492302d69fdfc848dd0f7357add9c019f9ce4f65b6c04dc4405bad0999a0e008a78b2f0285603271d402977ce2cc9297ea5d363a87d520c2a7dd6558796d9a4ea9c6b0effd15c6c453ba8a11de2afda1caf660f51915fea2f3b32f1d9bb4e65e12363da014d3695234c7547af02c5e2b34f7d44d2eb891a6c430347d1d6933330fd58021b236d88b1fe8dc966321c804029ba350552ffa7bed33561f2b92e429ccb7f6268e6be56b0028630adb06f258329443f88f4a23aebd78dbb9c79455335e06b119aed3723991a83a90f35389716eaa76f65a592421369f8fa2d7d7c3fa1c22d53b3c4282f83c5d1cf86ec404dce70302be55131078204870306cc7c018ccf2105b395d0f5c00d6a9881addb3ac7037eb10e1f14e4a8b00c270968f4e2a3481d2204d21ede48f52ae89966c2506f45d2eae6fd6d5f17245c967522e81c53d22ff1c48c9546d355ccd365ef4c88b8e715268ca66a65b600ac824837869921a50ade57f5aae982cfd332229e21f4f8d8e7820a753aa45d21f79c1a16d3d761a2534e11e020b39d5465140366a97989436d7405525d106ddbfb145edaf1d6207ad1af784c9afc8371831d41aca035e71d6ff1060450cbc7f0ccfe6b2530b33edf07c601c24e646fe37c9ced03956f967fe1b89ca7d814f68d4726bd78606e28a6d8218e63bb859f084ba5f7d2c69b35f9e413cd0da1051018b71122931eead10a46d0a267d7d95b12c870ee5641e3c1c777ccde3de7828df7b4ccb6d99af6fcf185c5e2c1b95d4f4d171aff5b34825bd3d55af4b3f120c9cd40741f84fd97829ae7589f7326d4d6d150db31f27c800225a011735308109e9eb374b71dd6c01ae9157e24892bf835ae35275fe4382536069b664b5bd1eeee3c9f6dcd319eab6cabc80fd80e9d58e48698c6c8e340517d3506fbcc64ec4b3074a9ecabdd0b9315f5516c4562bea24b167c18f70db40e8687892341d737c937b6625dd8901281584af8713f3d9974183d377b013008e403bc23d9b18addbaa7722b4d728137c56dee81fcdc09308a138456ae59d9f8a198e3dbdd738e0b7959d4693d5e26156266b45c4dfa8b645207974864c191b9a214154acfc544a1c3b1e9cd64e933aa76c42dd811ba1561819d10a1c301ee71b0e1a460eb6a7403ccc6474844987b9ad6448927881e1ce374e59a9cc76160d2cc08b2c5cca9d17ba8d85dd557a7aef3094f232b53a64449c81e0836352193589dc4989b239e396dd3a842d53f8f54c7dc6e53289f38693a1ae4182539d38f820df13e95af0d466db47c411d0ee8b0009324ac26cb8761aabfa0fd480fdcf765c47b2b1bde13b0c775a2f899c4507da7d6b39065e019ebc0b9980be985fbf9840b5940cc02e679e1f79510d95192d4086a86560b34bad23e7b0f0c862fb41bfac108da62874e391a9e650f98b5884bb0181b6a9253290d8a8feadcf2abeaff5cfc7fd6a562514b562b43d395b48af145f7811bdb4b9113a911a72d85bb687ea340f5a5e674b99229570ee5375e3b625d9957bac5ee4f26f9a3d411ed3f175e17d0d0299df495c021f48d9dabbe5a7f4aa3d64e83673481aad7bba1cec3aee991b4d0c7f009908ec6d6bfd2d5ed0ebb89548e4a5d7de45796bc21bf5dd49bc4d623af43ad1d53298a03e7258d44bdd02704a7d8963523331a4385cc1d4e00653102b9c4be9a1e8f72485e5471ff2db2b8", 0x1000}, {&(0x7f0000002d00)="aa3f683fa8fd23d81ff9a989a3dedc4ef6b03ceadaaff63878b6b699a5f1b6224fa41183d1c67e2ed6a235d226859f8d51d798a71d6eefb9f9310dc0af10b65a47a8e90ddb66b5e1288fc33d59369fa58ed32b61d6c1454d3acb3bfd80b4467847e59febbf6f697b4f97e593d549b4a4f58dd66fce5083d27bf83da044112f77a2c37ee91d3ddb659390383303f67c32", 0x90}, {&(0x7f0000002dc0)="5a9f53773e4f4b662dc07e842c76977ff913288bd5026d5013215fb8201d48acd6455cc08905b8f7585f55e2a8d9aa1ef10f64e76095d7dc806c6bf8ef35c8f1e8235d046904f550369a1bacd7cbcc39369e709e84edeea48f9d2fb76da440069edcf2a15a24c5fcf36e8026e41765de675890509589929385507c18", 0x7c}, {&(0x7f0000002e40)="79d512503ff818ae4d7065123105ee2f1a7704bfc71b714b4639a7962f4cd15deb7e384e089b3cbf5235664a32c658d9394267be6c37c8d52972842a3bd2395b58b0827e5e4ea578", 0x48}], 0x5, 0x0, 0x0, 0x10}, {&(0x7f0000002f40)={0x27, 0x1, 0x1, 0x0, 0x3, 0x3, "fd5c9fbfd9af5f14eadd5d0a022f1437624ceb92fef0fc9888824c741b1cdce84c1f600f86c14607e98a306ae93a4ac32940542a8fc7e2d62556fc218a8d5f", 0x18}, 0x60, &(0x7f0000004340)=[{&(0x7f0000002fc0)="8a46446e379a9855fac81d923d48491e491ebfd1393919c325bdde84eeeb8bf86ff2a91c5468066a4449cb618c5a2a2b0d4a42476eef32747e3ad5d9c2b1759793701ed2ae8ea83f4716eea8f3a53e17632682984e1cd9dec676c7989f0f9234109dcdb37324931555df224159a47bebe4545f2e1c6d3d4f6ec681f59105c2bd1a26e93c2484381f0ef1617669ab8bc512dd37f587e1f332bae612a19a00ada6577d484e01b149f05bbcb5c2919a9b10a844e58acf6ab1befc44b88bb13048608356e502b492739de9f19771567d83da96563c0fefc34818a7333ae7fed8fe3d647403df59351eebc4eee3b2", 0xec}, {&(0x7f00000030c0)="2fd86a352537cb7770b89c0f2fb3a2458ed14bb86f2035dfc0476f22421e29a66bbf053e810f7babc7cc9c8b9b7c5a852484dcaff7053d2f96f6bdf65bde8e3e0337be3d104914e68a97bae04a5a9f83b60110b7935b904eeb949c8382af070e35209928152a0de38ae821c00d9902092678f9fd5e18bb88d1cefb3eb981c36d979d15931ee90e3f40ec21ac5b78f714196fd14304beb99df4bd130688936df864183febe62f93045e0426563fdec13cdc5a9c70ca7bd75e0b7c6e2e8b77ad51ed9f6f2c95bf67c3", 0xc8}, {&(0x7f00000031c0)="eccf3a9659632c19902bc37701e00acea2a30ae97e51fbbf1538381bdda66342cbd0b4bd3cef125e2c668174ed84ebe08e929881565c8b0aed114a6d42e5f04a95a39e3c8c945eaba0", 0x49}, {&(0x7f0000003240)="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", 0x1000}, {&(0x7f0000004240)="d0f92c6890a69a482e58c7b43cd791c4ae0cc06f0cb1f77258e239102750de26bb09d922b69d9a8a6dc5ad46acdf2d11f489e894e42313b330a6bc501b832c414b03fb6fee7876b16a819df338058a9c89437cd863affb001254ca4614dcbc1105048449b8519ec1524c5a1adb7303edddfcc8ac5ab6b7219a4674016dcbcebc0591cdeba1d4a50f5da14245ebf646fe72f48e24e9f0baf0eb3904e0cbff2d5022461d75c8ec670299349d8e8693e7bb4ce09319ddfb133cab6438f22f5a32d6764b2eb44bf5c3a8", 0xc8}], 0x5}, {&(0x7f00000043c0)={0x27, 0x0, 0x1, 0x7, 0x8, 0x1, "9ed759440454be4464ca3564ab8a86fcfc31612cbad63179a8ded0ef17ef3ecef879a465808a1efe9d36ae0134419fb02910c203de12909874b5236d952340", 0x2e}, 0x60, &(0x7f0000004480)=[{&(0x7f0000004440)}], 0x1, &(0x7f00000044c0)={0xa0, 0x0, 0x6, "3bcf1ec992b9c6d9db60c7f9623f65f1385c2ff1562bb3c72998a4bf1c7fd1aa67700fee078fafe4f433df03ee41ffb911ab092371317e93ded318e997edadc693c4a84810de968ed9f64823622fb0f5a1a5101b1d91fc1797eea75afd25e283226b5092b644f442324dec8dcea929f655c1b4bfe282f17651fe147cb6c80b514711a2be284383ba6fd7a08e"}, 0xa0, 0x24004804}], 0x6, 0x40010) pkey_free(0xffffffffffffffff) pkey_alloc(0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000047c0)=""/170) [ 803.948470] hfs: can't find a HFS filesystem on dev loop6 06:41:06 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x3b9ac9ff}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200000, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x9, "b2ab319fb4a0858850"}, &(0x7f0000000080)=0x2d) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 804.138923] nla_parse: 24 callbacks suppressed [ 804.138933] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 804.192174] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xf000000]}}, 0x1c) 06:41:06 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xdc0d000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0045103, &(0x7f00000000c0)={{0x410000ffffff94}}) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:06 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xb000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x116, 0x0) 06:41:06 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x1400000000000000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x9, 0x100) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40100, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000de1f3c37b323f3a29b5bffffff000000002000db000c00000057e36f3492d979f6e60020e583cd1d6b6497625b9d76eb975814d22175f6e1"], &(0x7f0000000140)=0x30) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000040), 0x4) 06:41:06 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x62, 0x0) [ 804.548609] attempt to access beyond end of device [ 804.553727] loop3: rw=4096, want=136, limit=5 [ 804.558284] gfs2: error 10 reading superblock [ 804.560224] hfs: can't find a HFS filesystem on dev loop6 06:41:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x44, 0x0) 06:41:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = fcntl$getown(r0, 0x9) socket$netlink(0x10, 0x3, 0x0) move_pages(r1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=[0x3], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) 06:41:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000001400)='/dev/userio\x00', 0x48000, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) r4 = getuid() ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000380)={0x0, 0x0, {0x27, 0x35, 0xe, 0x1a, 0x4, 0x7fffffff, 0x5, 0xaf, 0xffffffffffffffff}}) write$UHID_INPUT(r2, &(0x7f00000003c0)={0x8, "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", 0x1000}, 0x1006) setreuid(r3, r4) renameat(r1, &(0x7f0000000140)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000009, 0x10, r0, 0xc) getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) 06:41:06 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xe8, 0x0) [ 804.597282] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 804.621202] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 804.627201] hfs: can't find a HFS filesystem on dev loop6 06:41:06 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x40000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 804.667429] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 804.683098] attempt to access beyond end of device [ 804.688139] loop3: rw=4096, want=136, limit=5 [ 804.692728] gfs2: error 10 reading superblock 06:41:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x217, 0x0) 06:41:06 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffffffffffffff7f}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:06 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x67, 0x0) [ 804.847517] hfs: unable to parse mount options [ 804.859886] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 804.886089] hfs: unable to parse mount options [ 804.899158] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xac05]}}, 0x1c) 06:41:07 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xf79d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40001, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") ioctl(r1, 0x100, &(0x7f00000000c0)="1bfcd93d5f0168867711b783c89702abb6e6b4ad6c0165c77edb72f07382bcb70b95f5eda2b3eddfc862d96aea17b4cf4e5c5b48a4ac2006471651e45604928a1efad7de1b62184d5c6aa24dc88fca3125f46678527065d014871d23a46d697650be0329ba3ad0d8606e6d771d853e02fbca7fc09a28db9ef9642cb94671d9c5b771c54404309b40d8dc318109c9e42d92668a4204436c58ce91e8be64ec3911a0de9e8b10d022f3334605a064920b7372b983cf730936d22c7ca3b771") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:07 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x11000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1a8, 0x0) 06:41:07 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x1000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:07 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x1400}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xd0, 0x0) [ 805.512753] hfs: can't find a HFS filesystem on dev loop6 [ 805.533987] attempt to access beyond end of device [ 805.539041] loop3: rw=4096, want=136, limit=5 [ 805.543609] gfs2: error 10 reading superblock 06:41:07 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfbffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 805.555977] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 805.569127] hfs: can't find a HFS filesystem on dev loop6 [ 805.595805] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001700)='/dev/dsp\x00', 0x480082, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001880)=0x14, 0x800) sendto$packet(r0, &(0x7f0000001740)="7d7a50cc38f378e26780daf6f0bac739aaa6ea4aee2b1bc1d1812dc942861d35964cce64045ee9b16b8dfd405a65a8c9b7d63f884520282219126ada64208a2b2c62fed59e116e8e787292875a24a6b941d5c3dfd70e97b693e2e104ae1095140fde407a62f3db10e70c8bdea44e60ca0d264066bed3b2203e45754eb2de95596f56e93534c525d975413ae75a9b6710751a9414e2fc4ae80f65205d7de913e41f3b3929c2b0f212ed391888b96b4a4800b06b1c020db2e1d41d81bc5174dcc57318e1e37fca65454841a06cbd19d7d4297976ca96dbc7c36f30070d0716f204911bc44a3938f399da90f24ad8b3853f9c3128ee46a70c", 0xf7, 0x80, &(0x7f00000018c0)={0x11, 0x5, r1, 0x1, 0x7c7, 0x6, @dev={[], 0xd}}, 0x14) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/cgroup\x00') 06:41:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x91, 0x0) [ 805.632199] attempt to access beyond end of device [ 805.637337] loop3: rw=4096, want=136, limit=5 [ 805.641920] gfs2: error 10 reading superblock 06:41:07 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x14000000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 805.689003] hfs: unable to parse mount options 06:41:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x225, 0x0) 06:41:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xc80a]}}, 0x1c) 06:41:07 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xb00000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:07 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r2 = dup2(r0, r1) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000100)) ioctl$sock_proto_private(r2, 0x89ea, &(0x7f00000000c0)="d80e1cfd201ee33bae8ef10df8618325f0f1bdc1ad215eccff1a23a6dd333ff0") syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x210400) ioctl$KDADDIO(r2, 0x4b34, 0x1) [ 805.723596] hfs: unable to parse mount options 06:41:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8916, &(0x7f0000000080)="0a5cc8070031cc0c707ebb9ea0aa67d204f1221585b85959e7c31ef6167f7046570fc575a5efd4dd8810055de47840b09ff4cb8a58f992d06c6178a38f01877356cbaf9354097bee8f4d27122372becda255787c0973bba824ff46abcb8d1fe2c9405397f5c32314560d74a20000000000") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000140)=0x100001, 0x4) personality(0x6000000) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:07 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffff1f00}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1c5, 0x0) [ 805.812902] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 805.854890] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd]}}, 0x1c) 06:41:08 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x1a000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:08 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x4000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 805.933092] hfs: can't find a HFS filesystem on dev loop6 06:41:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d7, 0x0) 06:41:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x1) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000040)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="5c71fb8ce6264ce6e5cf254a", 0xc}, {&(0x7f00000000c0)="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", 0xff}], 0x2) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000240)=""/110) 06:41:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x3) r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) socket$pppoe(0x18, 0x1, 0x0) [ 806.004202] hfs: can't find a HFS filesystem on dev loop6 [ 806.029058] attempt to access beyond end of device [ 806.034122] loop3: rw=4096, want=136, limit=5 [ 806.038676] gfs2: error 10 reading superblock 06:41:08 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0xa0010000000000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:08 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xddc}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x3631ef0f00000000]}}, 0x1c) 06:41:08 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x10400) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x1000, 0x800, 0x15f3, {}, 0xfffffffffffffc00, 0x10001}) ioctl(r0, 0x9, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f00000000c0)='syz1\x00') r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xb4, 0x800) accept$alg(r2, 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f0000000040)={0x0, 0x10001}) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x7fd) [ 806.129061] attempt to access beyond end of device [ 806.134112] loop3: rw=4096, want=136, limit=5 [ 806.138662] gfs2: error 10 reading superblock 06:41:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) getpeername(0xffffffffffffff9c, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000000)=0x80) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 806.213390] hfs: unable to parse mount options 06:41:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x3b, 0x0) 06:41:08 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x128, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:08 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0xffc99a3b00000000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 806.272031] hfs: unable to parse mount options [ 806.286746] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:08 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x5453}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x80000001, 0x400) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000040)) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x18) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:08 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x19, 0x0) 06:41:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x128, 0x0) 06:41:08 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x278, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:08 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x1000000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 806.522278] hfs: unable to parse mount options 06:41:08 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x2, &(0x7f0000000040)="0a5cc807a4315f85715070f9f05a998e72db69e4f48701933eb9cd016700e4987cdf1ca14255c98d9aeda0829da7c39e94812fc823c63d7587b40825890127935aa0070136da04985864aac4000209d597f3cd063c0ae12c52d0deb2952dc7524019064a90dcc5a4ff2f2d8f83741f1dd8117b234c9dd737a1bb6ab6d2ba828bb45238") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x200) 06:41:08 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1a00, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 806.577466] hfs: unable to parse mount options 06:41:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x179, 0x0) 06:41:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x700000000000000]}}, 0x1c) 06:41:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xcb, 0x0) 06:41:09 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x97ffffff00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:09 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffffffffffff, 0x220000) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000000c0)=""/99) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:09 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x1a0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xfc, 0x0) 06:41:09 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xc000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:09 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000100)=""/104, 0x68}, {&(0x7f0000000180)=""/95, 0x5f}, {&(0x7f0000000240)=""/54, 0x36}, {&(0x7f0000000300)=""/150, 0x96}, {&(0x7f0000000280)=""/43, 0x2b}], 0x6) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x58, 0x0) [ 807.158856] attempt to access beyond end of device [ 807.159423] hfs: can't find a HFS filesystem on dev loop6 [ 807.163867] loop3: rw=4096, want=136, limit=5 [ 807.163878] gfs2: error 10 reading superblock 06:41:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) pkey_alloc(0x0, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x202) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f00000000c0)={[{0x2, 0xe7c, 0x7f, 0x40, 0x5, 0x4, 0x1, 0x81, 0x5, 0x7fffffff, 0x1ff, 0x9a, 0x1}, {0xc810, 0x6, 0x6, 0xa87c, 0x0, 0x80, 0x3ff, 0x26be, 0x80000001, 0x7, 0x1, 0x100, 0x1}, {0x0, 0x6, 0x400, 0x7fff, 0x81, 0xff, 0x9, 0x3, 0x1000, 0x7, 0x6, 0x1ff, 0x6}], 0x5}) [ 807.209935] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 807.215565] attempt to access beyond end of device [ 807.224997] loop3: rw=4096, want=136, limit=5 [ 807.229548] gfs2: error 10 reading superblock 06:41:09 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x14}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x7e, 0x0) 06:41:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x124, 0x0) [ 807.288846] hfs: can't find a HFS filesystem on dev loop6 06:41:09 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfdffffff00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:09 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xd603, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 807.415382] hfs: can't find a HFS filesystem on dev loop6 [ 807.463870] hfs: can't find a HFS filesystem on dev loop6 06:41:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x3e00000000000000]}}, 0x1c) 06:41:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x83, 0x0) 06:41:10 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x100000000000000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x182, 0x0) 06:41:10 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x1) pkey_free(r1) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) getsockname(0xffffffffffffff9c, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000001c0)=0x80) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000002c0)=0x5, 0x4) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x400, 0x0) vmsplice(r2, &(0x7f0000000580)=[{&(0x7f00000004c0)="aef836cc078bb57b3c9d6aed35d38f595b4d170eb35a5bf543bbd4b04bc84c850c3628631522609095806ad8e12d63d5f1ef5a4cdebcd1a5d09ec4af9d796fd6e4db0afdb08aa828b23f7a62f914a5a787f2fd6d9e5359db8aadefd63203c4faaec66aaed855bbfdaa3cedb701a0fd2b5659f9d4a55bda9163ef0e4bb6d60bbbe1d2ab5db676ec3fc35e9b5e7e3f2578ad233f0b4991e12047a8b1d1ea62562e7bd714142d9f350d1dfbcbf53970f1909915360b", 0xb4}], 0x1, 0x2) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x4000, 0x0) mq_getsetattr(r4, &(0x7f0000000380)={0x608, 0xffffffff, 0x243, 0x3f, 0x1, 0xd8, 0x4, 0x5}, &(0x7f00000003c0)) r5 = syz_open_dev$audion(&(0x7f00000005c0)='/dev/audio#\x00', 0x0, 0x200) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000780)=@filter={'filter\x00', 0xe, 0x4, 0x3f0, 0x258, 0xe8, 0x0, 0xe8, 0x258, 0x358, 0x358, 0x358, 0x358, 0x358, 0x4, &(0x7f0000000740), {[{{@ip={@broadcast, @broadcast, 0xffffffff, 0xff000000, 'veth0_to_bridge\x00', 'bridge_slave_1\x00', {0xff}, {0xff}, 0x4, 0x1, 0x14}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x5, 0x724, 0x20, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'irlan0\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x5f, 0x3, 0x7}, 0x0, 0x110, 0x170, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x11, 0x7, 0x6, 0x1}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x1f, 0x2, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev={[], 0x13}, 0x0, 0xe, [0x28, 0x6, 0x38, 0x13, 0xc, 0x35, 0x22, 0x25, 0x19, 0x3, 0x33, 0xb, 0x2e, 0x28, 0x19, 0x34], 0x3, 0xffff, 0x145}}}, {{@uncond, 0x0, 0xb8, 0x100, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x3ff, 'syz0\x00', 0x80000001}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x450) sendto$unix(r4, &(0x7f0000000640)="177655ea72ebb7460a7148e12452fae45ac73d98d23cfafe09047dd1a9090933596e2ebb3877a68862f55c1964134c0d77e82f62262b520dc1a0807458d6c9b2200538fee55dc31fd32d230d992dc6198db63e1e180c", 0x56, 0x0, &(0x7f00000006c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000400)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e20, 0x9, @remote, 0x5}, @in6={0xa, 0x4e21, 0x100, @local, 0x75c}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e22, @loopback}], 0x98) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000600)) utime(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0xced0, 0xedc}) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f00000000c0), 0x4) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000300)) 06:41:10 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xd602, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:10 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x8cffffff00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:10 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1, &(0x7f0000000200)="0a5cc80700315f84715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d4, 0x0) [ 808.069297] hfs: can't find a HFS filesystem on dev loop6 06:41:10 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x2ee, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x12b, 0x0) 06:41:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000000c0)={0x732, 0x5, 0x3, 'queue1\x00', 0xac0}) 06:41:10 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x4000000000000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 808.129383] hfs: can't find a HFS filesystem on dev loop6 [ 808.148064] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:10 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x803) 06:41:10 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xa00000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:10 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000000003ffd, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r1, 0x7d32f842}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 808.324710] hfs: can't find a HFS filesystem on dev loop6 [ 808.385484] hfs: can't find a HFS filesystem on dev loop6 06:41:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfe800000]}}, 0x1c) 06:41:11 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x1a, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:11 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0xa00100}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket(0x4, 0xa, 0x80000000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000180)={{0x3b, @empty, 0x4e21, 0x1, 'wlc\x00', 0x5, 0x3, 0x24}, {@loopback, 0x4e24, 0x3, 0xe1, 0x9, 0x5c09}}, 0x44) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x20040) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$sock_proto_private(r2, 0x89e9, &(0x7f0000000240)="fd5da18484e76f7001c10b41bde77e5237d987cfc56005249d3e2cdfecf70908c19ca81667e6e0b019819525c534ca8089147b9989384aff4f48627843ef51bc42424f0c51e0e3a71e2478abf3ed8b474db2b93fe588c4eb015206389ce880102b58089c87094ed87983658ecb9ce855583b532d56b9370a8bf25fc7777d1ed6d622e1ad749fb96ea1f9ee46bc42c3259d89204fc0fbb521a517e56963ab0b88870a8c763211120c29036d4557c2a37521abb19e345eab2d1bbc912e5fd6897a7ee5cc3b611505de3372372e01d794bc1a8a") fstat(r0, &(0x7f00000000c0)) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) ioprio_set$pid(0x10006, r3, 0x3) 06:41:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x115, 0x0) 06:41:11 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xf5ffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:11 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4000000000000000) 06:41:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xc7, 0x0) [ 808.993231] hfs: unable to parse mount options [ 809.001687] attempt to access beyond end of device [ 809.006808] loop3: rw=4096, want=136, limit=5 [ 809.011379] gfs2: error 10 reading superblock 06:41:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x1) r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x381539, 0x11) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x182) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0x4, 0x7}}, 0x10) 06:41:11 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0xffffffffa0010000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1c2, 0x0) 06:41:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x195, 0x0) 06:41:11 executing program 5: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x1000) [ 809.048469] hfs: unable to parse mount options [ 809.057443] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:11 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x3f000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 809.131611] attempt to access beyond end of device [ 809.136682] loop3: rw=4096, want=136, limit=5 [ 809.141275] gfs2: error 10 reading superblock [ 809.178198] nla_parse: 18 callbacks suppressed [ 809.178208] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 809.210996] hfs: can't find a HFS filesystem on dev loop6 06:41:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x9912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:11 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x3e4, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 809.227274] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 809.263851] hfs: can't find a HFS filesystem on dev loop6 06:41:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x700]}}, 0x1c) 06:41:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000)={0x2, 0x7}, 0x2) 06:41:11 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x1a0ffffffff}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:11 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x167, 0x0) 06:41:11 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400040, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x78) r2 = getpgid(0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000100)=r2) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:11 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xff0f}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x129, 0x0) 06:41:11 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x7400000000000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:12 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x22000000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 809.930941] hfs: unable to parse mount options [ 809.938896] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 809.962879] hfs: unable to parse mount options 06:41:12 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, r1, 0x1, r0, 0x20000000000) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x1) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) pkey_alloc(0x0, 0x0) r3 = pkey_alloc(0x0, 0x2) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x2, 0x4) pkey_free(r3) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f00000000c0)={0xcee3, 0x3, 0x80000001, {0x0, 0x1c9c380}, 0xffffffff7fffffff}) 06:41:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x18b, 0x0) 06:41:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x800, &(0x7f0000000000)="d5ecd6050f42c437f9f9f2ca18b05f94783eb3c6a25421816ae337b8a4449af6cc34f066504021aaf32393623d0249993ea625418ca30b48b0a7a00a032f31fd9419b6652909c2e20983eef4f58040819c349e76b13d6a0687d1efb53e12b59e67901b137f3accdd16ca0a2b322a0906919bcbb6426fb827ab1c4094016285d3d2b2e9389dbaca73ebcf66bebbaf7b7003d10d2e6999a868ce81786f664b8d142d7971059221521ec8e828f879e1dbd5d5325e1285150608d872fa853dffa6c27d9b3e07f68d3d854fcdcbdfe36cf3de1cc0ed82da08ab57b0e3c09605fcefeaebbd2638a4945b36eec26f", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000300)="82ff5e6345e83091b13923a93f92edbc91d2cbba02ceb5133831714eac413c06749ad7d758157b61207a091e23214ce79ec6162d4908e2ed1d52388ff4f872f0af043e7b59af08982711f969851fafbd38f815c73a7aeac88b74cd3e93247ef1f94a3b5b7c0e73268d140c76ff81f67393af41c7791e82c2c82a461160f0b1eafd12be36cf10682bb4a0448911fe656a1c967aff29799eb9fe3fd85a1f4be45c60cc4178d84a01514cc7e07d0f0b28df6990c36648e8369e6f40a8d17e3350faaa2e295fc6aa7a631b56bbe8c611eb1c2b132ef964639e4298c61e62af") ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 809.978068] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 809.998290] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 810.024078] attempt to access beyond end of device 06:41:12 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4244}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 810.029112] loop3: rw=4096, want=136, limit=5 [ 810.033683] gfs2: error 10 reading superblock 06:41:12 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0xa0010000}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 810.102909] hfs: unable to parse mount options 06:41:12 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x80802) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000040)) 06:41:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1a7, 0x0) [ 810.123468] attempt to access beyond end of device [ 810.128508] loop3: rw=4096, want=136, limit=5 [ 810.133079] gfs2: error 10 reading superblock [ 810.162218] hfs: unable to parse mount options [ 810.229000] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 810.253675] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5ac]}}, 0x1c) 06:41:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000006, 0x6) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffff, 0x4000) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:12 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xe, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:12 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x9}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:12 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0xffc99a3b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x68, 0x0) 06:41:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1c, 0x0) 06:41:12 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x9, 0x2, 0x8, 0x8, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0xf27, 0x5, 0x100, 0xfff, 0x8001, 0xf3, 0x6, 0x10001, 0xffffffffffffffff, 0x1000, 0x7, 0xffffffff, 0x401, 0x4, 0x1f, 0xff, 0xc6c, 0x0, 0xfffffffffffffffd, 0x7, 0x4, 0xbe5d, 0x3, 0x200, 0x100000001, 0x677, 0x0, 0xbb, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x1, 0x670, 0x0, 0x5, 0x900, 0x4, 0x5}, r1, 0x2, r0, 0x1) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 810.838404] hfs: unable to parse mount options [ 810.846691] attempt to access beyond end of device [ 810.851712] loop3: rw=4096, want=136, limit=5 [ 810.856408] gfs2: error 10 reading superblock [ 810.875922] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:12 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() setgroups(0x4, &(0x7f00000002c0)=[r1, r2, r3, r4]) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) getegid() 06:41:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xa7, 0x0) [ 810.904775] hfs: unable to parse mount options 06:41:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x21e, 0x0) 06:41:13 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x2000000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 810.926422] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 810.936621] attempt to access beyond end of device [ 810.941647] loop3: rw=4096, want=136, limit=5 [ 810.946215] gfs2: error 10 reading superblock 06:41:13 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:13 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0xe4030000, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in6, @in=@broadcast, 0x4e20, 0xffffffff, 0x4e20, 0xfff, 0x2, 0xa0, 0x20, 0x4, 0x0, r3}, {0x9, 0x69e3, 0xfffffffffffffffb, 0xd8, 0x0, 0xad75, 0x3ff}, {0x0, 0xe2, 0x0, 0x5bd}, 0x7, 0x0, 0x0, 0x1, 0x3, 0x2}, {{@in6=@local, 0x4d6, 0xff}, 0xa, @in=@broadcast, 0x3502, 0x6, 0x2, 0x7e, 0x0, 0x1, 0x5}}, 0xe8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r4, 0x81785501, &(0x7f0000000140)=""/188) openat$cgroup_int(r4, &(0x7f0000000240)='cpuset.sched_load_balance\x00', 0x2, 0x0) 06:41:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xf]}}, 0x1c) 06:41:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xb1, 0x0) 06:41:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x800000080000, 0x0) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000100)=0x1c) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000140)={'veth1_to_bridge\x00', {0x2, 0x4e22, @loopback}}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0xde1a, 0x5, 0x4}) [ 811.063701] hfs: can't find a HFS filesystem on dev loop6 [ 811.112238] QAT: Invalid ioctl [ 811.118836] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 811.126216] hfs: can't find a HFS filesystem on dev loop6 [ 811.134947] QAT: Invalid ioctl 06:41:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x72, 0x0) 06:41:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xa]}}, 0x1c) [ 811.161806] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:13 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='Lockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:13 executing program 0: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x11c, 0x0) 06:41:13 executing program 5: r0 = socket$inet6(0xa, 0x80004, 0x1) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x10000000800) 06:41:13 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfbffffff00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:13 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x22, 0x0) 06:41:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8001, 0x101000) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f00000000c0)={{0x8, 0xdfc}, 0x1, 0x9, 0x6, {0x7, 0x1}, 0x4, 0x8000000000000000}) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 811.323081] gfs2: invalid mount option: Lockproto=lock_nolock [ 811.329065] gfs2: can't parse mount arguments [ 811.345595] hfs: can't find a HFS filesystem on dev loop6 06:41:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xac05000000000000]}}, 0x1c) [ 811.371633] gfs2: invalid mount option: Lockproto=lock_nolock [ 811.377681] gfs2: can't parse mount arguments [ 811.392522] hfs: can't find a HFS filesystem on dev loop6 06:41:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d6, 0x0) 06:41:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xd1, 0x0) 06:41:13 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='#ockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:13 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xdc0d0000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:13 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:13 executing program 5: r0 = socket$inet6(0xa, 0xfffffffffffe, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r1, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xe3a, 0x200) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000180), 0x4) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x80000002, 0x101082) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 811.508651] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xde, 0x0) [ 811.571832] gfs2: invalid mount option: #ockproto=lock_nolock [ 811.572500] hfs: can't find a HFS filesystem on dev loop6 [ 811.577851] gfs2: can't parse mount arguments 06:41:13 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 811.635898] gfs2: invalid mount option: #ockproto=lock_nolock [ 811.642114] gfs2: can't parse mount arguments [ 811.654914] hfs: can't find a HFS filesystem on dev loop6 06:41:13 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x5) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x100, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0xffffffffffffffff, 0x9fd, 0x4, 0x2]}) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000300)) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) fchdir(r0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x800000000005fdf, 0x4000) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0x32, @rand_addr=0x7f, 0x4e20, 0x2, 'lblc\x00', 0x10, 0x9, 0x21}, 0x2c) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x103000) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x80000, 0x0) 06:41:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x33, 0x0) 06:41:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) rseq(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:13 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='uockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:13 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4d50}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:13 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 811.782705] gfs2: invalid mount option: uockproto=lock_nolock [ 811.788770] gfs2: can't parse mount arguments [ 811.821098] hfs: unable to parse mount options [ 811.829745] gfs2: invalid mount option: uockproto=lock_nolock [ 811.835709] gfs2: can't parse mount arguments [ 811.853155] hfs: unable to parse mount options 06:41:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb4000000000000]}}, 0x1c) 06:41:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xc3, 0x0) 06:41:14 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='%ockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x8, 0x0) 06:41:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r0 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x2000)=nil, 0x2000) shmdt(r0) 06:41:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:14 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x8}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:14 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 812.293372] hfs: unable to parse mount options [ 812.311715] gfs2: invalid mount option: %ockproto=lock_nolock [ 812.317800] gfs2: can't parse mount arguments [ 812.333853] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:14 executing program 0: socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x50000, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000100)=0x8) connect$vsock_dgram(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) [ 812.352777] hfs: unable to parse mount options 06:41:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0xfffffffffffffffb, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x171, 0x0) 06:41:14 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1a7, 0x0) 06:41:14 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x2000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 812.403719] gfs2: invalid mount option: %ockproto=lock_nolock [ 812.409712] gfs2: can't parse mount arguments 06:41:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x538d58176bb18c97) pkey_alloc(0x0, 0x2) r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_names\x00') ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f00000000c0)={0x1, 0x3}) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:14 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='*ockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 812.496130] hfs: can't find a HFS filesystem on dev loop6 [ 812.555461] hfs: can't find a HFS filesystem on dev loop6 [ 812.597326] gfs2: invalid mount option: *ockproto=lock_nolock [ 812.603411] gfs2: can't parse mount arguments [ 812.647904] gfs2: invalid mount option: *ockproto=lock_nolock [ 812.653885] gfs2: can't parse mount arguments 06:41:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x40020000]}}, 0x1c) 06:41:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x213, 0x0) 06:41:15 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xdb0d}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x400) fcntl$getownex(r0, 0x10, &(0x7f0000000640)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000880)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f00000009c0)=0xe8) r7 = getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a00)=0x0) r9 = getuid() lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$inet6(0xa, 0x80a, 0x7, &(0x7f0000000f00)={0xffffffffffffffff}) r12 = getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f40)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)=0x0) r15 = fcntl$getown(r0, 0x9) fstat(r0, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001600)=0x0) lstat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002a00)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002a40)={0x0, 0x0}, &(0x7f0000002a80)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002ac0)={0x0, 0x0, 0x0}, &(0x7f0000002b00)=0xc) sendmmsg$unix(r1, &(0x7f0000002c00)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000005c0)=[{&(0x7f00000000c0)="c651bd123cbd42587301735e0c8334f53bee841b4c77ea389928ab563829d213bcc9b42306adc4cb43186a06d779ac035582513efabeada4cd2129eb7427723e2d340fee25a9cd050f6901b6b78b1ac6c4ab5066ae458fb49de3fd152908aa5adda2f13afbe9b6fd05336d40c09b0e8649504aeb6b1c38f512ff5b632b9214e55d3d48e7d54d2cf3b8ed0464125be06f6809613b3c3f75bcf12e6fe827a6199c25", 0xa1}, {&(0x7f0000000300)="05029775d53bf3f65e529c1f80b082af2846b938259a84ada697e7b6e07e3b7e832768b085976c5f74b25049c26f46e914e781cbcd00b15199aca8ca553526d44aa7344bcd63da43e055b44a1b8f4b934cd5b9bb5a299228490ad9014d4a60229b3cdcab25e7a6f154f846a3858e3d539598271416f28a56cc5535bc97760654b87281fbb92725f9196706ae13c40bf7e6b71f734538da2426b92a675a", 0x9d}, {&(0x7f0000000180)="b34f8d2f37f395e0d42b97c916c152deb86fa5debe12273de72a3badb33be68579e03b829ea5b9879e613b24c5873388cd5bab333b0135ab31eef24049c23602919b45a731400324e082db142294d72c7432c2036cdd7669fceb0dbba75200b00080743b2fbdf79f3860be87579a52abaf0f", 0x72}, {&(0x7f00000003c0)="edadb5e02d4ae71c56afdbc1ca61523b4e169e3f810d85c56a20719aa735306ba88bfe2bbe1b80874c964afdc3ab28a22b0da3acdd51ab954d865fcec1a37aee3ef0d420df110029b1fed570723f032689974f84159070abbae60395bc18b425d4bf0c11ac0c73c4ab7d77ae19b9c48d466213c749da3135095000fa2a055e67004515d34aec1f4023202b09f9b22f63069abb5e25c10181c7b0b9da9e89774c6b06b097a0cc5e1bd3d48f9cfbc819df327134c01b20769b375732fc6319d4ab4afbf2b17075f7ed7aaa3a359126ef4ca5070d24ddf148c39b0031c03f4012c85a2c784b52c108493183fdd64238d26d6d", 0xf1}, {&(0x7f00000004c0)="16b2d167f7b8aff59035121e2dd320a8e3bb9b2a48d44d95650c124d5e2e6e51eeb3933867411bf7f9c0745197b2423053666ac20e52f6bec79aed1d6f0d9e590c2d838ae988d289727f9d561113344ac57a7620a1eb8c62653778b5e1354f26bdfe91b0ab60261b29ab649eaa373de66ccc70eee639692bfd6c9e4b913333be62f5cee30b94925e2fe486c53f97fbbf701330675cde9aa82e75d2c14143266b879508ae8bb66c01c2b40d58f62ee4c538270e4be1ea4bf5b749ae5ff35c5ba8de4452ec58276928c310df0b6a893e89f5d8b7eca28c0fa57e5ed3fbd043155ab81f89bbf97190f254056b2827c92ec64f454b9308", 0xf5}, {&(0x7f0000000240)="4e6e77065e3a01a3e31bd7ca9b103b6d7c20f6e594ab7b5830c4650d4d7c32903013d3b7d8b47282e30881225dd0a2a841994713830a5f5c432ffc566e69d3b73da1f1b555bb92c50c6889fe9a3ac62981cb07ca94d90a8a67c7d4d68a9a8953feadaf5b4eb04c95084dd110724c9a9b6f7f28666397157c71a41be8608721f1", 0x80}], 0x6, &(0x7f0000000b00)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0xe0}, {&(0x7f0000000c00)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000c80)="ab9e2aac373595002956c96c9678a7609d657f7995a905be1eb3ca66e3f7dbf6fbcc980633cf30e6ed1b902f3d4d8bf397579f2a12f7", 0x36}], 0x1, &(0x7f0000000d00)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}], 0x38, 0xc004}, {&(0x7f0000000d40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000dc0)="ffa881cd8694d2e8042f05dc82297b7f1bb2f2cd7e65f779ca255eb49f2c05169bab4e4b475475e96a1f5d6c67a34cdf04d5a7ae97c5062c0a53873c4a697a1e1193c45f4546013d21040e386a19d37c518ba66485ce2c2c1fc6c697b9029b107c74acb601b652bed0fc83351492fc2d0567684cddbd693dc19b948e6a9fd74cb4b07c9e081766519ff54e85eb6249263d3fb3db5ea0a7a75f7b969ca8fd8fb89f9cb925ae3f68b7b0e5c22f8fd30852704814a16ab29452616f2f9402297524f7f47c008f62c8241e028096ef6d5d8b5a383b590db649577e82991ffba50b2079", 0xe1}], 0x1, &(0x7f0000001280)=[@rights={0x20, 0x1, 0x1, [r0, r0, r11]}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}], 0x60, 0x4000}, {&(0x7f0000001300)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001380)="2498af9704168d91bb2ac3dc5c7daec61ff698f23bc5facd725919ce45eb201058a1a611d6ac71aa4cf38d91154498b37a9faf692452385dee1a1fc001424edd44127c264b34985e148e501e7c6cce27b407324c8a2967", 0x57}, {&(0x7f0000001400)="cba453a1fd084e60ce8d7d96c60a0b3b43adae6f6c02eec0995ea88b34f7e63a0fe8021cb6897df0d1a5afafcfd4bb50417579286bf5622c7314e8e731dda1ad1cefdd9ddfcf48ad62be8d", 0x4b}, {&(0x7f0000001480)="3b5263d75884e02e370a7e7878f53a22298190968c7092a7453facfcc15674c5eb7a7b6ff784e9172ecd926df1bb38537fddb0e1c0317cb827c3b2eb160f2a", 0x3f}, {&(0x7f00000014c0)="8af042dc439ae469dfe6ebfb8fec9f2877a1ef7f3c8a62c0c332914727ee7e60326da142ebd8ce3f7d6f7904be0f5f42bf95c560acb4a2a22014715677ec9bf1be104810117fc4f7cdab287158bff69348027b8063f620e143fb492827df0c85e025ed0b96d51a8f7cf7445dc75cbd59d4525b9e71dd5f1f2106c8dbb40e679f1af7d07267c3a007626a9ef90b73c10cf2956c7e6cef370252968caef39d44c4f77825c4b74b18e78fa9f164604c73c368a8c7191eb97b4e8fbc3b2527e4b9ff4dc3963d19766bf0abf1762cf9e464ea91cb8e096aa35dc6dd86cbe83d4fc3943325e8eedfc23b47692121b94bf1c67a", 0xf0}], 0x4, &(0x7f00000017c0)=[@cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0x58, 0x40000}, {&(0x7f0000001840)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000029c0)=[{&(0x7f00000018c0)="f2d35ede7bbd9ea32a04d89b9daea4b0d3b3c4f195d810ee8e1d472e131c94bd2cb6cd", 0x23}, {&(0x7f0000001900)="dc13d2c1dac0d80bd8d5b3a602ccb3582a18e2709a26dbace309cef2c12262ba6dc926800dd2ef8387813630cf0a6490d3f8115dccc3a92667816e5fe3f182bf64461838170fa457674e9e07d90432e68fe66c77e8c40be1b76384f9bb73a1fb5d940ddbdd89c274dac4e1e4159540d3c1ae9a1ae5a328412f84a3a064944667d63a7e28883d370520a8983f3bfa0b5864f6258612ffe0248ad37c36419f775cb20ced18d1f08d064207f0556cff0be996213222d82a299520c97b7197180dfc", 0xc0}, {&(0x7f00000019c0)="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", 0x1000}], 0x3, &(0x7f0000002b40)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}], 0x98, 0x44}], 0x5, 0x85) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:15 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:15 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='+ockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:15 executing program 0: delete_module(&(0x7f0000000100)='md5sum\x00', 0x800) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0xc02, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000001240)={@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x3, 0x4, {0xa, 0x4e23, 0x8001, @ipv4={[], [], @rand_addr=0x4}, 0x7f}}}, {&(0x7f0000000240)=""/4096, 0x1000}, &(0x7f00000001c0), 0xd}, 0xa0) getsockopt$sock_int(r1, 0x1, 0x26, &(0x7f0000000140), &(0x7f00000000c0)=0x4) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0), 0x2274) 06:41:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x14c, 0x0) [ 813.184981] gfs2: invalid mount option: +ockproto=lock_nolock [ 813.191008] gfs2: can't parse mount arguments [ 813.199180] hfs: unable to parse mount options 06:41:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x280200, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_netdev_private(r0, 0x89f0, &(0x7f00000000c0)="c6ac6170613705adcb3da8d41b112dc6cbc5d959651bd37b49147d3a59c3ba58046f2f2d1b1e63a2d79f433406346c85335b1e6d8d07beaf7b2a06850a1cf1fbca74d2245be5612931585d614d3551c5a86ef6ae2ed9a7aa4a1721f1097c1e4e0dc089a3a32023d9a2f08d21cce4cadedd0a558117d22df8c58f53a3e94d08eb0b6f8963f4a41869a942f66ab0f457c49049d9c2") listen(r0, 0x1) 06:41:15 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 813.242605] hfs: unable to parse mount options [ 813.255055] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0xfffffffffffffffb, 0x5, 0x6}, 0x10) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 813.295782] gfs2: invalid mount option: +ockproto=lock_nolock [ 813.301775] gfs2: can't parse mount arguments 06:41:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x5d, 0x0) 06:41:15 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xa}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0xad1fbb28041fb477) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x3) r0 = pkey_alloc(0x0, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000000c0)=0x1) pkey_free(r0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000001c0)={r2, 0x87b, 0x80}, 0x8) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x2, 0x4) 06:41:15 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='.ockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:15 executing program 5: r0 = socket$inet6(0xa, 0x400000000004, 0x81) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x4, 0x70, 0x400, 0x9, 0x1000, 0x7, 0x0, 0x4, 0xe09, 0x2, 0x7, 0x7, 0x7, 0xfffffffffffffffe, 0x3, 0x7ff, 0x400, 0x6, 0x2, 0x5, 0x9, 0x9, 0x200, 0x0, 0x4, 0x8, 0x2, 0x1000, 0x31, 0x1, 0x1, 0x7, 0xfffffffffffffffb, 0x101, 0x0, 0x84d4, 0xffffffffffffffc0, 0x2, 0x0, 0x3f, 0x0, @perf_config_ext={0x1, 0x2}, 0x3060, 0xffffffffffffff81, 0x20, 0x7, 0x2, 0x3, 0x7e87}) r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) [ 813.526588] hfs: unable to parse mount options [ 813.538090] gfs2: invalid mount option: .ockproto=lock_nolock [ 813.544097] gfs2: can't parse mount arguments [ 813.578893] gfs2: invalid mount option: .ockproto=lock_nolock [ 813.584903] gfs2: can't parse mount arguments [ 813.598559] hfs: unable to parse mount options 06:41:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x218]}}, 0x1c) 06:41:16 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1ea, 0x0) 06:41:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1ff, 0x80) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r1, 0x810, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x1) 06:41:16 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='-ockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x16a, 0x0) 06:41:16 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x3}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x400000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x6, 0x7fffffff, 0x4, 0x6}) [ 814.095243] hfs: unable to parse mount options [ 814.102469] gfs2: invalid mount option: -ockproto=lock_nolock [ 814.108418] gfs2: can't parse mount arguments [ 814.133608] hfs: unable to parse mount options 06:41:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000000)="27d6a7658c7ba91008ffd155609705a0f67af6605b7b1b1e74", 0x19) 06:41:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) pipe(&(0x7f0000000100)) 06:41:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xa8, 0x0) [ 814.155497] gfs2: invalid mount option: -ockproto=lock_nolock [ 814.161469] gfs2: can't parse mount arguments 06:41:16 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:16 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='/ockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:16 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfffffffd}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x80fe]}}, 0x1c) 06:41:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) 06:41:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x204, 0x0) 06:41:16 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e21, 0x9f, @dev={0xfe, 0x80, [], 0x13}, 0x9}, {0xa, 0x4e24, 0x5e3b619c, @loopback, 0x5}, 0x5, [0x9, 0x4, 0x7c4, 0x6, 0x8, 0xa0, 0x0, 0x9c4]}, 0x5c) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000001300)=0x9, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0xb0, "0bd4b33bf94ca96e0870d56a08a232676da7774f24cf5cd3aa3fa3ab4642ad2c04c18c9434f1c5e144636ffe324cd81075e255a01750b8db75d5494677f6b6837b8f5c5f5652a9d056f39d837405261c92f3c9701ef323c278a5c3c76963f2a6f0a70081996e2e820fa8d0bbad78b80903eed85b3262dceb5689e8fc7827f87966433fb2db639907e053dc14d1c8e3e20e8d83445b07ca29e0a5b56e29bdbe9c46f1f03c93bdcca8de02f07ac76c49af"}, &(0x7f0000000240)=0xb8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={r2, 0x1000, "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"}, &(0x7f00000012c0)=0x1008) 06:41:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x180, 0x0) [ 814.324972] gfs2: invalid mount option: /ockproto=lock_nolock [ 814.331009] gfs2: can't parse mount arguments [ 814.336046] nla_parse: 18 callbacks suppressed [ 814.336058] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 814.364834] gfs2: invalid mount option: /ockproto=lock_nolock [ 814.369804] hfs: unable to parse mount options [ 814.370845] gfs2: can't parse mount arguments 06:41:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb202000000000000]}}, 0x1c) 06:41:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/142, &(0x7f0000000100)=0x8e) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'ifb0\x00'}) 06:41:16 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='0ockproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:16 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r1 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r2, 0xfffffffffffffffc}}, 0x18) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000002c0)=0x100, 0x4) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r3 = gettid() capset(&(0x7f0000000240)={0x20071026, r3}, &(0x7f0000000280)={0x7fffffff, 0x21e, 0x10000, 0x0, 0x7c54, 0x1}) [ 814.419601] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 814.438068] hfs: unable to parse mount options 06:41:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x140, 0x0) 06:41:16 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:16 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffffffff00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x42, 0x0) 06:41:16 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x8, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 814.531896] gfs2: invalid mount option: 0ockproto=lock_nolock [ 814.537913] gfs2: can't parse mount arguments [ 814.546276] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 814.563017] capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure [ 814.620335] hfs: can't find a HFS filesystem on dev loop6 [ 814.642930] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 814.663683] gfs2: invalid mount option: 0ockproto=lock_nolock 06:41:16 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x900, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x10000, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 06:41:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x72, 0x0) 06:41:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x203, 0x0) 06:41:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.FinderInfo\x00') [ 814.669780] gfs2: can't parse mount arguments [ 814.682406] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 814.698503] hfs: can't find a HFS filesystem on dev loop6 06:41:16 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x7400000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:16 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:16 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='\nockproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 814.832412] hfs: can't find a HFS filesystem on dev loop6 [ 814.881176] hfs: can't find a HFS filesystem on dev loop6 [ 814.883019] gfs2: invalid mount option: [ 814.883019] ockproto=lock_nolock [ 814.894309] gfs2: can't parse mount arguments [ 814.914587] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 814.968473] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 814.971231] gfs2: invalid mount option: [ 814.971231] ockproto=lock_nolock [ 814.984567] gfs2: can't parse mount arguments 06:41:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1802000000000000]}}, 0x1c) 06:41:17 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x8) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x202080, 0x10) write$cgroup_int(r1, &(0x7f0000000100)=0x5, 0x12) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) 06:41:17 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x9000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715370") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x10b, 0x0) 06:41:17 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:17 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xc6, 0x0) 06:41:17 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='l\nckproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:17 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x171, 0x0) [ 815.389505] hfs: can't find a HFS filesystem on dev loop6 [ 815.397706] gfs2: invalid mount option: l [ 815.397706] ckproto=lock_nolock [ 815.405222] gfs2: can't parse mount arguments [ 815.427916] hfs: can't find a HFS filesystem on dev loop6 06:41:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1f1, 0x0) [ 815.435176] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:17 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.mem_exclusive\x00', 0x2, 0x0) fdatasync(r0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 815.467225] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 815.491189] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 815.522940] gfs2: invalid mount option: l [ 815.522940] ckproto=lock_nolock [ 815.530393] gfs2: can't parse mount arguments 06:41:17 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x7a000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000100)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240)={0xffffffff, 0x2, 0x6eb, 0x7ff, 0x3a}, 0x14) pkey_free(0xffffffffffffffff) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'system.', '/lo{\x00'}, &(0x7f0000000180)=""/122, 0x7a) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:17 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xd4, 0x0) 06:41:17 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='l%ckproto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 815.659286] QAT: Invalid ioctl [ 815.673572] QAT: Invalid ioctl [ 815.689279] hfs: can't find a HFS filesystem on dev loop6 [ 815.697221] gfs2: invalid mount option: l%ckproto=lock_nolock [ 815.703243] gfs2: can't parse mount arguments [ 815.735027] hfs: can't find a HFS filesystem on dev loop6 [ 815.750679] gfs2: invalid mount option: l%ckproto=lock_nolock [ 815.756664] gfs2: can't parse mount arguments 06:41:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5400000000000000]}}, 0x1c) 06:41:18 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:18 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x17, 0x0) 06:41:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x800) 06:41:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1df, 0x0) 06:41:18 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lo\nkproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r0 = socket(0xa, 0x8080f, 0x5) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x95ef, &(0x7f00000000c0)=0x2) 06:41:18 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xdb0d0000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x100) io_setup(0x80000000, &(0x7f0000000080)=0x0) io_cancel(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f00000000c0)="40a538257baaedb43657f6168a35a60bbfa99ccfdde9874611914a72906a341f9e66f8f04469b922ff678f09c8f0c7e90a06d2f9b6f224781a25ed0e94721093cf0ee85eec89e1cc7cf061f9005f44e96274068ca4c4fe9c0ed32d078b34ce80bd11362336499ec5a6287d4d0c380b89af74f80cc93d39208e30a1ef4cd4c54ec4d3e67f5363c0f77d37d8febf870a21b476d898e3585981f0f0ddd15174ea8529bea29d09a1a0dbe7bd57f42c4c4debcf6473afb8ed78112f4ead5dc003fbefabb7c9817d9f7626d8c2dcad6e551e89347b", 0xd2, 0x7, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000240)) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) [ 816.295107] gfs2: invalid mount option: lo [ 816.295107] kproto=lock_nolock [ 816.295581] hfs: can't find a HFS filesystem on dev loop6 [ 816.302520] gfs2: can't parse mount arguments [ 816.332046] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:18 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)) 06:41:18 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x124, 0x0) [ 816.361558] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 816.384216] hfs: can't find a HFS filesystem on dev loop6 [ 816.387249] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 816.425075] gfs2: invalid mount option: lo [ 816.425075] kproto=lock_nolock [ 816.432468] gfs2: can't parse mount arguments 06:41:18 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = socket$inet6(0xa, 0xfffffffffffe, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") socket$inet6(0xa, 0xe, 0x20) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:18 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfdffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:18 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:18 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000000)='/dev/userio\x00', 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1b, 0x0) [ 816.614672] hfs: unable to parse mount options [ 816.663799] hfs: unable to parse mount options 06:41:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x16080000]}}, 0x1c) 06:41:19 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xe5, 0x0) 06:41:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x46, 0x0) 06:41:19 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lo%kproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000000c0)={0x2, 0x7, 0xffffffffffffe012, 0x3, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0xfffffffffffffff7}, 0x8) 06:41:19 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:19 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xeb09}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:19 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x16d, 0x0) [ 817.190980] hfs: unable to parse mount options [ 817.192010] gfs2: invalid mount option: lo%kproto=lock_nolock [ 817.201640] gfs2: can't parse mount arguments [ 817.222273] hfs: unable to parse mount options 06:41:19 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1f0, 0x0) 06:41:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:19 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6c00}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 817.269219] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:19 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 817.346306] gfs2: invalid mount option: lo%kproto=lock_nolock [ 817.352375] gfs2: can't parse mount arguments 06:41:19 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) pipe(&(0x7f0000000000)) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x40, 0x83a, 0x40, 0x7, 0x2000000000000000, 0x2}) socket$inet6(0xa, 0x6, 0x9) 06:41:19 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x36, 0x0) [ 817.399904] hfs: can't find a HFS filesystem on dev loop6 [ 817.461160] hfs: can't find a HFS filesystem on dev loop6 06:41:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd00]}}, 0x1c) 06:41:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='loc%proto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1cd, 0x0) 06:41:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000000c0)={{0x7d, 0x3, 0x2, 0x5, 0x1ff, 0x80}, 0x2, 0x81, 0x2, 0x1, 0x40, "3cff8e6f6b6a0f75e8cfa089400d9bc2e0c51c7c089308bdfe47a63d7355210a43269ee0f2c9c58060aff6ed5bc0343e57aa25e4d3a84f49ee41e8e1cf45115d1511f0becccece3e60027ca25450267d089f03529f28a61346376693d8d6e9edfa6f2d2aea0036bd1c307299fbbd7d935d02908b635586e40f86d16a56a0ddcc"}) 06:41:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b, 0x0}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1b6, 0x0) 06:41:20 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x7400}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x40000085) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) write$input_event(r1, &(0x7f0000000040)={{0x77359400}, 0x17, 0x1, 0x9}, 0x18) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x800) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 06:41:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x3) r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x7) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 818.127960] gfs2: invalid mount option: loc%proto=lock_nolock [ 818.133980] gfs2: can't parse mount arguments [ 818.156758] hfs: can't find a HFS filesystem on dev loop6 06:41:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x1a000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) socketpair(0x8, 0x4, 0xdae, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) [ 818.211897] hfs: can't find a HFS filesystem on dev loop6 [ 818.226157] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 818.241294] gfs2: invalid mount option: loc%proto=lock_nolock [ 818.247266] gfs2: can't parse mount arguments 06:41:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1dd, 0x0) 06:41:20 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4f01000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='loc\nproto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x3) r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 818.386107] hfs: can't find a HFS filesystem on dev loop6 [ 818.432565] gfs2: invalid mount option: loc [ 818.432565] proto=lock_nolock [ 818.440211] gfs2: can't parse mount arguments [ 818.453521] hfs: can't find a HFS filesystem on dev loop6 [ 818.509803] gfs2: invalid mount option: loc [ 818.509803] proto=lock_nolock [ 818.517178] gfs2: can't parse mount arguments 06:41:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb4]}}, 0x1c) 06:41:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000000c0)=0x7, 0x8) 06:41:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20040, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x80800) 06:41:21 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x100000000000000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:21 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x7a}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x154, 0x0) 06:41:21 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lock#roto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x149, 0x0) 06:41:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x31, 0x0) [ 819.067701] gfs2: invalid mount option: lock#roto=lock_nolock [ 819.073709] gfs2: can't parse mount arguments [ 819.080606] hfs: unable to parse mount options 06:41:21 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000140)={0x6, 0x2b5}) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="73797a30913a923e443d6da32718bf2462cb38c4cec855a1328cbcd0c79ba3a063d21b7377686ebbb28da5ec6426d6ba7c65dd708c3fe444a6ffc471a922f5adffe3727fc176870ec9d522c7fd561f283b09e57ea062c644783fac842cabf758cbf86109ae62452a320e7e5ee3b396288ab9a4747d06a202ff7e7145c269811262193a50874b47b626752c812b445777345826092f351c6139204edde232b21d06812d739d5a289e0bd15c1d3ce6effcbe646d81c00dcbf6b6a9e988d91c8faaac7112"], 0xc3) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000340)=@req={0x81, 0x100000001, 0x1, 0x4}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000380)="765e414ed1c304f32fa2624c41b84a27", 0x10) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 819.120725] hfs: unable to parse mount options 06:41:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000086, 0x2) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fdinfo\x00') r2 = getpid() ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0xa19, 0x8, 0x9, 0x3, 0x1, r2}) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x801) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x9) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000000)) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) 06:41:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1ba, 0x0) 06:41:21 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0xffc99a3b}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 819.141608] gfs2: invalid mount option: lock#roto=lock_nolock [ 819.147634] gfs2: can't parse mount arguments 06:41:21 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x1fffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x2) 06:41:21 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lock%roto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x14]}}, 0x1c) 06:41:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x15a, 0x0) 06:41:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/157, 0x9d}, {&(0x7f0000000480)=""/251, 0xfb}], 0x2, 0x0, 0x0, 0x31}, 0x0) setsockopt$llc_int(r1, 0x10c, 0x3, &(0x7f0000000600)=0x7fff, 0x4) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 819.316506] hfs: unable to parse mount options [ 819.326139] gfs2: invalid mount option: lock%roto=lock_nolock [ 819.332101] gfs2: can't parse mount arguments 06:41:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x2) r0 = pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x3) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x40000, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) pkey_alloc(0x0, 0x2) futex(&(0x7f0000000180)=0x1, 0xb, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0x2, 0x0) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAW(r2, 0x5407, &(0x7f00000000c0)={0xcf, 0xe9a8, 0x10001, 0x3, 0x6, 0x200, 0xfff, 0x0, 0x8, 0x6}) 06:41:21 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x1000000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 819.359956] hfs: unable to parse mount options 06:41:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x574c56cb]}}, 0x1c) 06:41:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x75, 0x0) [ 819.416260] gfs2: invalid mount option: lock%roto=lock_nolock [ 819.422239] gfs2: can't parse mount arguments 06:41:21 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockdroto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:21 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x100000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:21 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000033c0)=[{&(0x7f0000000000)=""/47, 0x2f}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/108, 0x6c}, {&(0x7f0000000140)=""/84, 0x54}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/9, 0x9}, {&(0x7f0000002240)=""/71, 0x47}, {&(0x7f00000022c0)=""/243, 0xf3}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x9, 0x49) pkey_free(0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000003480)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f00000034c0)={0x4, 0x1, 0xa8b, 0x600}) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 819.519826] nla_parse: 14 callbacks suppressed [ 819.519837] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 06:41:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x67, 0x0) [ 819.580288] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 819.581856] gfs2: invalid mount option: lockdroto=lock_nolock [ 819.594899] gfs2: can't parse mount arguments [ 819.615471] hfs: can't find a HFS filesystem on dev loop6 [ 819.650076] hfs: can't find a HFS filesystem on dev loop6 06:41:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xdd, 0x0) 06:41:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r1 = dup(r0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0x5a, "9c253a5f49d265abc8506cc000f669711c1905ab107ca2cfc8a16ea9da8a050471e359289b4932a0baac301684f594c96f3b4da753a375c9d876ba67356716d1cfa63aa41774d518c86ecd18c46c486ef237cb88e2f3510261d5"}, &(0x7f0000000000)=0x7e) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000140)={0xff, @dev={0xac, 0x14, 0x14, 0x1b}, 0x4e20, 0x2, 'sh\x00', 0x22, 0x1000, 0x34}, 0x2c) 06:41:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x4]}}, 0x1c) 06:41:21 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x1a0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x13f, 0x0) 06:41:21 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4c000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 819.723710] gfs2: invalid mount option: lockdroto=lock_nolock [ 819.729713] gfs2: can't parse mount arguments 06:41:21 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockXroto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 819.838642] hfs: can't find a HFS filesystem on dev loop6 [ 819.845280] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 819.881641] hfs: can't find a HFS filesystem on dev loop6 [ 819.896187] gfs2: invalid mount option: lockXroto=lock_nolock [ 819.902207] gfs2: can't parse mount arguments [ 819.911862] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 819.951714] gfs2: invalid mount option: lockXroto=lock_nolock [ 819.957688] gfs2: can't parse mount arguments 06:41:22 executing program 5: r0 = socket$inet6(0xa, 0xe, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 06:41:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x57, 0x0) 06:41:22 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x100000080000, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x8b, 0x6, "1b9462904b4745d1dd98d382bbeb67fba17194baca4b3ef28f63db7ad0df75515252736254712c0da0097372fd1753c810b8533debe836522e7076a879a3a067de5e07df92c6f7ca540aa092354710ab4657d732bfda62e41523a5d2132c87ae767525386cc47f53f9568d8f8d46c64afc79005bc4cc296990006aeee502017fae7412"}, &(0x7f0000000200), 0x1400) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0xfffd, 0x0) 06:41:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xffffff91]}}, 0x1c) 06:41:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x56, 0x0) 06:41:22 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x40000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:22 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x5000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:22 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lock+roto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 820.324614] hfs: can't find a HFS filesystem on dev loop6 [ 820.335890] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 820.340594] gfs2: invalid mount option: lock+roto=lock_nolock [ 820.350393] gfs2: can't parse mount arguments 06:41:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xc6, 0x0) 06:41:22 executing program 0: r0 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x4000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000240)=""/4096) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1608000000000000]}}, 0x1c) 06:41:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 820.369660] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 820.376521] hfs: can't find a HFS filesystem on dev loop6 [ 820.407193] gfs2: invalid mount option: lock+roto=lock_nolock [ 820.413188] gfs2: can't parse mount arguments 06:41:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x890f, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:22 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xf4ffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:22 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x14}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x2) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffff, 0x200) write$P9_RSTATFS(r1, &(0x7f0000000100)={0x43, 0x9, 0x2, {0x7fffffff, 0xff, 0x7, 0x100000001, 0x800, 0xffff, 0x6a5, 0x0, 0x3}}, 0x43) pkey_free(r0) ioctl$VT_RELDISP(r1, 0x5605) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{0x8, 0x0, 0x8000, 0x3fffc}, {0x6, 0x5, 0x2, 0x18}, {0x80, 0x0, 0x5, 0x1}]}, 0x10) getitimer(0x3, &(0x7f0000000000)) 06:41:22 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lock0roto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 820.507622] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 06:41:22 executing program 5: r0 = socket$inet6(0xa, 0x4, 0xfffffffffffffffe) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x7ff) [ 820.558719] hfs: unable to parse mount options [ 820.591907] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 820.609782] gfs2: invalid mount option: lock0roto=lock_nolock [ 820.615773] gfs2: can't parse mount arguments [ 820.617822] hfs: unable to parse mount options 06:41:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0, 0xab}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080)={r1, @in6={{0xa, 0x4e23, 0x8f26, @remote, 0x8}}}, 0x84) 06:41:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x0) r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) r1 = gettid() ptrace$setsig(0x4203, r1, 0xfffffffffffffff9, &(0x7f0000000000)={0xb, 0x3ff, 0x1, 0x1}) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:22 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xdc0d}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 820.664793] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 820.702471] gfs2: invalid mount option: lock0roto=lock_nolock [ 820.708511] gfs2: can't parse mount arguments 06:41:22 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x4000000000000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:22 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lock\nroto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x3) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x0) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x80000000, 0x90001) 06:41:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x12b, 0x0) [ 820.820227] hfs: unable to parse mount options [ 820.861636] hfs: unable to parse mount options [ 820.870224] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 820.889219] gfs2: invalid mount option: lock [ 820.889219] roto=lock_nolock [ 820.896616] gfs2: can't parse mount arguments [ 820.898247] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 820.939206] gfs2: invalid mount option: lock [ 820.939206] roto=lock_nolock [ 820.946608] gfs2: can't parse mount arguments 06:41:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1fb, 0x0) 06:41:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x3) r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x40200) syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x5, 0x204b80) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000300)=0xc) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000340)=0x6, 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x5, 0x30, 0x3, 0xffffffff}, &(0x7f0000000100)=0x18) write$P9_RVERSION(r1, &(0x7f00000003c0)={0x15, 0x65, 0xffff, 0x3ed7, 0x8, '9P2000.u'}, 0x15) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0x7, 0x8, 0x7}, 0x10) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e23, 0x10001, @mcast2, 0x401}, 0x1c) 06:41:23 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xe00}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8914, &(0x7f0000000000)="0a5c50700b0000c03a0000") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x800) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000080)) 06:41:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockxroto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0xffc99a3b00000000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xc000000]}}, 0x1c) 06:41:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1c6, 0x0) [ 821.346176] gfs2: invalid mount option: lockxroto=lock_nolock [ 821.352165] gfs2: can't parse mount arguments [ 821.360440] hfs: can't find a HFS filesystem on dev loop6 06:41:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1, 0x0) write$cgroup_int(r0, &(0x7f00000000c0)=0xffffffff, 0x12) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48010, 0x0) pkey_alloc(0x0, 0x3) fadvise64(r1, 0x0, 0x1, 0x7) [ 821.391551] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r4 = socket$inet6(0xa, 0x0, 0xc0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x524d) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000100)=0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000140)={r5, 0x1, 0xa, 0x9, 0x81, 0x37}, 0x14) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{r2, r3+30000000}, {0x0, 0x989680}}, &(0x7f0000000080)) 06:41:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x1400}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 821.434564] gfs2: invalid mount option: lockxroto=lock_nolock [ 821.440579] gfs2: can't parse mount arguments [ 821.445198] hfs: can't find a HFS filesystem on dev loop6 06:41:23 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfffffff6}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x17e, 0x0) 06:41:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockiroto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 821.584079] hfs: unable to parse mount options 06:41:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0xa0010000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 821.629983] hfs: unable to parse mount options 06:41:23 executing program 0: r0 = memfd_create(&(0x7f0000000000)='/dev/userio\x00', 0x3) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x20000003) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000001c0)={0x969, 0x5, 0x3}, 0xc) r4 = accept4(r2, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) listen(r4, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x13e, 0x0) 06:41:23 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xa0010000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:23 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 821.703334] gfs2: invalid mount option: lockiroto=lock_nolock [ 821.709454] gfs2: can't parse mount arguments [ 821.775152] gfs2: invalid mount option: lockiroto=lock_nolock [ 821.781182] gfs2: can't parse mount arguments [ 821.803798] hfs: can't find a HFS filesystem on dev loop6 06:41:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) 06:41:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0xa00100}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 821.849709] hfs: can't find a HFS filesystem on dev loop6 06:41:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1100]}}, 0x1c) 06:41:24 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x14000000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xf4, 0x0) 06:41:24 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockoroto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:24 executing program 5: r0 = getpid() r1 = fcntl$getown(0xffffffffffffff9c, 0x9) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x240500, 0xc0) r3 = socket$inet_udp(0x2, 0x2, 0x0) kcmp(r0, r1, 0x1, r2, r3) r4 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffe) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockopt$inet_int(r5, 0x0, 0x37, &(0x7f0000000080), &(0x7f0000000240)=0x7c) ioctl(r4, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") write$UHID_CREATE(r5, &(0x7f0000000300)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000100)=""/18, 0x12, 0x4, 0xfff, 0x2, 0x3, 0x1f}, 0x120) r6 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$IOC_PR_REGISTER(r6, 0x401870c8, &(0x7f0000000000)={0x5e1f8e6e, 0x4}) 06:41:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="8e000000d5793c3a13f184e889e8b03d887e6b6381a14da91d2c6e2795eb69f9973987f5daf974d951b27be3368b0a7be5eb2a9819c9419c0286cb9f8bc39a3191566fe8260abba3590000000000000000e75697f84a70fbb2363e2ad38cdc0a5e6aaf08b6476af35cd145efc28a40eefd6c5962bfbd327b9adbc61a47769c2d756d7df664ba70bd2b99906fa289cbf3cd"], &(0x7f00000001c0)=0x96) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)={r1, 0x3}, &(0x7f0000000280)=0x8) pkey_free(0xffffffffffffffff) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000300)={0x6, &(0x7f00000002c0)=[{0x7, 0x6af01b3}, {0x100000000, 0x292}, {0x9ce3, 0x5}, {0x0, 0x1}, {0x1000, 0x1}, {0x1f, 0x7}]}) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) 06:41:24 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x74000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xe4, 0x0) [ 822.223246] gfs2: invalid mount option: lockoroto=lock_nolock [ 822.229227] gfs2: can't parse mount arguments [ 822.234568] hfs: can't find a HFS filesystem on dev loop6 06:41:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xdc, 0x0) 06:41:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") getsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) pread64(r1, &(0x7f0000000080)=""/126, 0x7e, 0x0) fcntl$setsig(r0, 0xa, 0x3) 06:41:24 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x8, 0x10001, 0x5, 0xb399, 0x0, 0x939a, 0x200, 0x4, 0x8, 0x7, 0xffffffff, 0x7f, 0x9, 0x197, 0x3ff, 0x2, 0xffffffffffff8001, 0xffffffff, 0x81, 0x4, 0x7, 0x2, 0x1, 0x2, 0xebe, 0x8, 0x1, 0xc9bd, 0xffffffff, 0x0, 0x1ff, 0x401, 0x7fffffff, 0xc9, 0x6, 0x803f, 0x0, 0x9, 0x3, @perf_config_ext={0x5, 0x7}, 0x20, 0x4, 0x1, 0x3, 0x0, 0x4, 0x10001}, r1, 0xb, r0, 0xb) pkey_alloc(0x0, 0x3) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x20050, r0, 0x0) r2 = pkey_alloc(0x0, 0x2) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) pkey_free(r2) r4 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xe3c, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000340)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6, 0x4e23, 0x0, 0x4e21, 0x9, 0xa, 0x80, 0xa0, 0x7f, r5, r3}, {0x81, 0x3, 0x2, 0x4, 0x2, 0x4, 0x85, 0x100000001}, {0x80, 0x8, 0x9, 0x93}, 0x5, 0x6e6bbb, 0x2, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d2, 0x3c}, 0x2, @in=@multicast2, 0x3504, 0x2be3e1c9a20b881a, 0x3, 0x4, 0x1ff, 0x6, 0x8b8000000000000}}, 0xe8) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xf5, 0x0) [ 822.276586] gfs2: invalid mount option: lockoroto=lock_nolock [ 822.280012] hfs: can't find a HFS filesystem on dev loop6 [ 822.282659] gfs2: can't parse mount arguments 06:41:24 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x1400000000000000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:24 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x900}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x219, 0x0) [ 822.368069] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:41:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x8d2) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)=0x0) r2 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x4000) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000240)=0x9552) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x7fffffff, 0xfffffffffffffff7, 0x2, 0x6caa1f00, 0x0, 0x40, 0x4, 0x0, 0x8000, 0x6, 0x3, 0x1, 0x0, 0x0, 0x59, 0x7, 0x81, 0x3000000000000, 0xaf, 0x6, 0x6, 0x80000001, 0xff, 0x0, 0x5, 0x6, 0x2, 0x1ff, 0x6, 0x5, 0x4, 0x1000, 0x9, 0x3, 0x0, 0x3, 0x0, 0x2, 0x2, @perf_config_ext={0x4, 0x7fffffff}, 0x2, 0x2, 0x1000, 0x7, 0x5, 0xffff, 0x8}, r1, 0x3, r2, 0xa) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x800) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x20000) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000080)=""/73) [ 822.455880] hfs: can't find a HFS filesystem on dev loop6 [ 822.500855] hfs: can't find a HFS filesystem on dev loop6 06:41:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1608]}}, 0x1c) 06:41:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lock.roto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:25 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x7}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x1) r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:25 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x1a0ffffffff}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x56, 0x5, 0x500000}) 06:41:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x16e, 0x0) 06:41:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x144, 0x0) 06:41:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x505280, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000300)={0x4, 0x0, [{}, {}, {}, {}]}) accept(r0, &(0x7f0000000240)=@nfc, &(0x7f00000002c0)=0x80) pkey_free(0xffffffffffffffff) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r2 = memfd_create(&(0x7f0000000000)='selfproc\'nodev\\\x00', 0x2) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f00000000c0)=""/171, &(0x7f0000000180)=0xab) [ 823.193749] gfs2: invalid mount option: lock.roto=lock_nolock [ 823.199832] gfs2: can't parse mount arguments [ 823.206776] hfs: unable to parse mount options 06:41:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x77359400}, 0x10) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 06:41:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x2, 0x0) 06:41:25 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x4}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 823.263049] hfs: unable to parse mount options 06:41:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xb5, 0x0) 06:41:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x1) r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x148000, 0x0) 06:41:25 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x400000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 823.324551] gfs2: invalid mount option: lock.roto=lock_nolock [ 823.330517] gfs2: can't parse mount arguments 06:41:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x3e]}}, 0x1c) 06:41:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x14f, 0x0) 06:41:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lock*roto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x100) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @loopback, 0x6}, @in={0x2, 0x4e23, @rand_addr=0x8}, @in6={0xa, 0x4e20, 0x9c8, @ipv4={[], [], @broadcast}, 0x9}, @in6={0xa, 0x4e22, 0x10000, @mcast2, 0xa0}, @in6={0xa, 0x4e21, 0x2, @mcast1}, @in6={0xa, 0x4e22, 0x3, @local, 0x28}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}], 0xac) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r2, 0x8}, 0x8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e24, 0x7fff, @local, 0x40}, {0xa, 0x4e22, 0xff, @loopback, 0x2}, 0x74b0, [0x2, 0x9, 0x20, 0x100000000, 0x401, 0x2, 0x0, 0x1]}, 0x5c) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x181000) 06:41:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x155, 0x0) 06:41:25 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0xffffffffa0010000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x101100) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x1f, 0x4d, &(0x7f00000000c0)="d72731014f3468eab73d4a49bc840e301c3f79e2b789d9dca35293a22bb7baa78bea2fdcd69419322ac0e59331814973d67fdeb7f9bf6d076486ce15c47bb1b563d15b162b293736f265681c6f"}) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 823.458518] hfs: can't find a HFS filesystem on dev loop6 [ 823.510141] hfs: can't find a HFS filesystem on dev loop6 [ 823.517862] gfs2: invalid mount option: lock*roto=lock_nolock [ 823.523847] gfs2: can't parse mount arguments 06:41:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x11]}}, 0x1c) 06:41:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x132, 0x0) 06:41:25 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000040)={0x4, 0x3000000000000, 0x10000, 0x400}) r1 = socket$inet6(0xa, 0x0, 0x7ff) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0xebd, 0x490, 0x7, 0x1000, 0x2}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r2, 0x8000007, 0xd553, 0x8000}, &(0x7f0000000140)=0x10) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 06:41:25 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x2300000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xb2, 0x0) 06:41:25 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x3b9ac9ff}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 823.603917] gfs2: invalid mount option: lock*roto=lock_nolock [ 823.609941] gfs2: can't parse mount arguments 06:41:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x7, 0x4, 0x8a, 0x9, 0x10001, 0x3f, 0x7fff, 0x3, 0x800, 0x2, 0x7}, 0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='locksroto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x11, 0x0) 06:41:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x24, 0x0) 06:41:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x1190c0, 0x0) getsockopt$llc_int(r1, 0x10c, 0xa, 0xfffffffffffffffe, &(0x7f0000000080)) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x113140) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 823.677614] hfs: can't find a HFS filesystem on dev loop6 06:41:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xffffff8d]}}, 0x1c) 06:41:25 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0xa0010000000000}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 823.744783] hfs: can't find a HFS filesystem on dev loop6 [ 823.774947] gfs2: invalid mount option: locksroto=lock_nolock [ 823.781039] gfs2: can't parse mount arguments 06:41:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000180)={0x2, 'erspan0\x00', 0x1}, 0x18) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:25 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4d010000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1b0, 0x0) [ 823.847209] gfs2: invalid mount option: locksroto=lock_nolock [ 823.853294] gfs2: can't parse mount arguments 06:41:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x10f, 0x0) 06:41:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x3e8]}}, 0x1c) 06:41:26 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='locklroto=lock_nolock'}, {@localflocks='localflocks'}]}) 06:41:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") timer_create(0x0, &(0x7f0000000080)={0x0, 0x3, 0x2, @thr={&(0x7f0000000000)="edf84dc270e5244653b9141c9aa64cfc510150563f", &(0x7f0000000040)="e2f18c2c15c2a810"}}, &(0x7f00000000c0)=0x0) timer_getoverrun(r1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x200000, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000140)=0x1, 0x4) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 823.915031] hfs: can't find a HFS filesystem on dev loop6 06:41:26 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:26 executing program 0: pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) [ 823.989838] hfs: can't find a HFS filesystem on dev loop6 06:41:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x144, 0x0) [ 824.052932] gfs2: invalid mount option: locklroto=lock_nolock [ 824.059023] gfs2: can't parse mount arguments 06:41:26 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x3960c}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:26 executing program 0: pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 06:41:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x200000000000000]}}, 0x1c) 06:41:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400000, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0x8, 0x9, 0x23, &(0x7f0000000040)="dd518ebfa384958de70a0531e8d3071740b234a091742a8d01c450ce5b5eb6174d68c9"}) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e24, @remote}, 0x10) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000140)={@multicast1, @broadcast, 0x0}, &(0x7f0000000180)=0xc) accept4$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000680)=0x14, 0x80800) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x1f}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000640)={0x5, 0x2, 0x8, 0x2, 0x1, 0x1, 0x1, 0x80000001, r5}, 0x20) getsockname$unix(r1, &(0x7f0000000340), &(0x7f00000003c0)=0x6e) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="d8000000", @ANYRES16=r2, @ANYBLOB="04002cbd7000ffdbdf250200000008000100", @ANYRES32=r3, @ANYBLOB="bc0002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r6, @ANYBLOB="3c00c739240001006c625f74785f6d6574686f64005a808c7f21a800000000000000000000002704fbd3e5641ae900000c000400686173680000000000000000000580bd19ee90e70f5f08f727c6c02c81fb283d1b1b660b01ada79cbf76b0320bbe0c9f086089a194a0e5e80fc9a6d8f0d0b75d000ad54008263dc2060109c3fc02d383e44efd4ec1e6a8c862b95dd556c9264c55de5ff55b124ce1c8"], 0xd8}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 06:41:26 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 824.097736] gfs2: invalid mount option: locklroto=lock_nolock [ 824.103741] gfs2: can't parse mount arguments [ 824.182218] hfs: unable to parse mount options 06:41:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xc0, 0x0) 06:41:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="dd3d9520000882f3800001005955252c262004ce0f3a7a8b918f4ce6fbc59c1eafa46ce8c730fec6ddcd1acbd651f7df619cda75edc3ca8c2027bad96ba9926aa4f3fac32534759f792db52e6db54c279e41005590e4b100c6139479aac58212059b084ce0db2f8b1c30945a9800000000000000000000"], &(0x7f0000000140)=0x18) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f00000003c0)={0x8001}, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={r1, @in={{0x2, 0x4e24, @multicast2}}, [0x7fff, 0xffffffffffffffe1, 0x24747c27, 0x8, 0x0, 0x7, 0x20, 0x4, 0x2, 0x3, 0xfffffffffffffff8, 0x3, 0x7, 0x7fff, 0x81]}, &(0x7f0000000180)=0x100) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff, 0x800) 06:41:26 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lock-roto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 824.207938] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 824.234050] hfs: unable to parse mount options [ 824.323572] gfs2: invalid mount option: lock-roto=lock_nolock [ 824.329619] gfs2: can't parse mount arguments 06:41:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x12e, 0x0) 06:41:26 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 06:41:26 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x2000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 06:41:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x101, 0x80) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x10000002}) 06:41:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x20b, 0x0) 06:41:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x2) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) semget(0x0, 0x6, 0x24b) [ 824.390561] gfs2: invalid mount option: lock-roto=lock_nolock [ 824.396576] gfs2: can't parse mount arguments 06:41:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)=""/65, &(0x7f0000000100)=0x41) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{}, {}, {}]}) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000000)=0x54, 0x4) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r3) [ 824.434335] hfs: can't find a HFS filesystem on dev loop6 06:41:26 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockuroto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 824.488064] hfs: can't find a HFS filesystem on dev loop6 03:33:20 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x3f}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x5, 0x204, 0x1f, 0x2, r2}, 0x10) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r3 = msgget$private(0x0, 0x200) msgctl$IPC_RMID(r3, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000003c0)={&(0x7f00000001c0)=@in6={0xa, 0x4e22, 0x1ff, @local, 0xbd8}, 0x1c, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000840000000600000000000000000000001800000000000000840000000500000020000000040000001800000000000000840000000600000003000000000000002000000000000000840000000200000007000002a000000022ae0000", @ANYRES32=r2, @ANYBLOB="1800000000000000840000000600000008000000000000002000000000000000840000000200000008000c02ff03000001000000", @ANYRES32=r2, @ANYBLOB="180000000000000084000000000000000000000008000900000100000003001f00040200000000020000000200000000000000000000000000", @ANYRES32=r2, @ANYBLOB="200000000000000084000000020000001f000100431f000001010000", @ANYRES32=r2, @ANYBLOB="1800000000000000840000000000000000000100fcff0900"], 0x120, 0x8000}, 0x884) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='/dev/userio\x00', 0xffffffffffffff9c}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) 03:33:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 824.547111] gfs2: invalid mount option: lockuroto=lock_nolock [ 824.553208] gfs2: can't parse mount arguments [ 824.594529] gfs2: invalid mount option: lockuroto=lock_nolock [ 824.600599] gfs2: can't parse mount arguments [ 824.682880] nla_parse: 28 callbacks suppressed [ 824.682890] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 824.702209] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xffffffff00000000]}}, 0x1c) 03:33:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1c0, 0x0) 03:33:20 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6c00000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xa6, 0x0) 03:33:20 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x200000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 03:33:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockcroto=lock_nolock'}, {@localflocks='localflocks'}]}) 03:33:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)={0xb2e}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000140)={0x2, 0x1, 0x8102, 0x29f, r0}) [ 825.073835] hfs: can't find a HFS filesystem on dev loop6 [ 825.077155] gfs2: invalid mount option: lockcroto=lock_nolock [ 825.085542] gfs2: can't parse mount arguments [ 825.104910] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:20 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20) getpeername$unix(r1, &(0x7f0000000240)=@abs, &(0x7f0000000180)=0x3d) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x3, [0x4, 0x6d88, 0x7fff]}, 0xa) [ 825.116175] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xe3, 0x0) [ 825.152744] gfs2: invalid mount option: lockcroto=lock_nolock [ 825.158739] gfs2: can't parse mount arguments [ 825.182277] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 825.214861] hfs: can't find a HFS filesystem on dev loop6 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xe1, 0x4000) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x4, 0x7, 0x7, 0x6f, 'syz1\x00', 0xb57}) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 03:33:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7fff, 0x40) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0xa3) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x48000, 0x0) 03:33:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockp\noto=lock_nolock'}, {@localflocks='localflocks'}]}) 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) [ 825.432680] gfs2: invalid mount option: lockp [ 825.432680] oto=lock_nolock [ 825.440100] gfs2: can't parse mount arguments [ 825.453955] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 825.493586] gfs2: invalid mount option: lockp [ 825.493586] oto=lock_nolock [ 825.498887] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 825.500950] gfs2: can't parse mount arguments 03:33:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x4002000000000000]}}, 0x1c) 03:33:21 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x300000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xcf, 0x0) 03:33:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x1, 0x1, 0xff, 0x2, 0x3, 0x3, 0x3968}, &(0x7f0000000040)=0x20) r1 = syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x400000) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000080)=0x4) 03:33:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000380)) fcntl$notify(r0, 0x402, 0x1) exit(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000100), 0x2000000000000291, 0x0) 03:33:21 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x17, 0x0) 03:33:21 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockp%oto=lock_nolock'}, {@localflocks='localflocks'}]}) [ 825.920067] gfs2: invalid mount option: lockp%oto=lock_nolock [ 825.926065] gfs2: can't parse mount arguments [ 825.934720] hfs: can't find a HFS filesystem on dev loop6 03:33:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x5, 0x3) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 825.961677] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 825.982866] hfs: can't find a HFS filesystem on dev loop6 [ 825.987700] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 825.992861] gfs2: invalid mount option: lockp%oto=lock_nolock [ 826.004527] gfs2: can't parse mount arguments 03:33:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x136, 0x0) 03:33:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xf8, 0x0) [ 826.012505] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:21 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:21 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockpr\nto=lock_nolock'}, {@localflocks='localflocks'}]}) 03:33:21 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x8000000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:21 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) 03:33:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x170, 0x0) [ 826.170990] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 826.197743] hfs: can't find a HFS filesystem on dev loop6 [ 826.201316] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 826.221215] gfs2: invalid mount option: lockpr [ 826.221215] to=lock_nolock [ 826.228665] gfs2: can't parse mount arguments [ 826.249479] hfs: can't find a HFS filesystem on dev loop6 [ 826.311147] gfs2: invalid mount option: lockpr [ 826.311147] to=lock_nolock [ 826.318514] gfs2: can't parse mount arguments 03:33:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xa000000]}}, 0x1c) 03:33:22 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000400)="00000000000000000000000082267708b646112023038078204a2b420f8cedb9755f111489dcdfd3d701a0664cfb0745bdc472c72c6c166f32b8536617bafe6a2b787e4811aa5e61e9e9da86bc5e2e51848c99ec7e7579ea20982a2528e8d14f849eb29e109e5b30ff9e4938072ffbc21dd2c922b0aecb7f381ac5630ca5aac9a37f2b757621c24b3d9b75ef016acc6369e1cd5e260f6a0ca03e00cba29a23e3e7501ad314bd5f2a1887f6a5b3846fd4d56d24201caa0000a4204d2397725db0721668acb1d2c3c1b9360505e9fbc82e6b3142067c58a7236b00e40ae73811b1a4") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) socketpair$inet(0x2, 0x6, 0xffff, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000a40)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f0000000600000070050000c8020000c8020000d80400000802000008020000d8040000d8040000d8040000d8040000d804000006000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e000000000000000000000000000000000000000000000000000000000801000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e8004801000000000000000000000000000000000000000000000000280074746c00000000000000000000000000000000000000000000000000000003070000000000002800727066696c7465720000000000000000000000000000000000000000000002000000000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaa0cfbff0f0008003b00400019001700400017003c003700350018002a000e001c001f002700000000000000050000009b000000000000007f000001e0000002ffffffff0000000076657468315f746f5f626f6e640000006272696467655f736c6176655f300000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006700022000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280045434e000000000000000000000000000000000000000000000000000000100003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00020010000000000000000000000000000000000000000000000003000616464727479706500000000000000000000000000000000000000000000010330020000000001000000000000002800727066696c7465720000000000000000000000000000000000000000000008000000000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001050000000800000000020000010000007f00000100000000000000ffffffffff696662300000000000000000a96768956970365f76746930000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001110000000000000000000000000000c000f0000000000000000000000000000000000000000000000000002800736574000000000000000000000000000000000000000000000000000001000299070000000030005450524f58590000000000000000000000000000000000000000000000000101000007000000ac1414bb4e230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000900b0285c4424bfe2aafd4593dd4dd422fdad65059a9351669d57d0307bf09f213ccace1992adc03260df3747e2969c6a03df4b008a6e75e33e33dd8febb153f42f879ac378d32aeec1d740cb60f7553f3a18154a6d5703b2464511258c4ef05a53b3afeb49a04628c6f7512f334214679c49ac0ceb5e8fb95b102bd07d85a9ef3c3d90b100c273a505a0c14e39c02621383c6d008ca8497e47883f42b20ebd2cac0e3d64ec4c3226a5f0970903a4b839d91bc5221defd7f3d8b48b51f3bbc64dfa4aef7b0d3f21ad86986422c"], 0x5d0) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r3 = accept4(r0, &(0x7f0000000040)=@alg, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x1, @mcast1, 0xbf0}}, 0x8, 0x4, 0x4, 0x9, 0x4}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000200)={r4, 0x0, 0x20000}, &(0x7f0000000240)=0x8) 03:33:22 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x68000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000380)) fcntl$notify(r0, 0x402, 0x1) exit(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000100), 0x2000000000000291, 0x0) 03:33:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1cb, 0x0) 03:33:22 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockpr%to=lock_nolock'}, {@localflocks='localflocks'}]}) 03:33:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x111, 0x0) [ 826.813548] gfs2: invalid mount option: lockpr%to=lock_nolock [ 826.819564] gfs2: can't parse mount arguments [ 826.838729] hfs: can't find a HFS filesystem on dev loop6 03:33:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1b8, 0x0) 03:33:22 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:22 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0xfffffffffffffdfa, 0xfa00, {0x0, {0xa, 0x4e21, 0x1, @ipv4={[], [], @rand_addr=0xde}, 0xffa}, r1}}, 0x226) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={r3, 0x48, &(0x7f0000000140)=[@in={0x2, 0x4e23, @rand_addr=0xaa}, @in6={0xa, 0x4e21, 0x87be, @dev={0xfe, 0x80, [], 0x20}, 0x100}, @in6={0xa, 0x4e22, 0x6, @ipv4={[], [], @multicast1}, 0x80000000}]}, &(0x7f0000000240)=0x10) [ 826.874766] hfs: can't find a HFS filesystem on dev loop6 [ 826.897043] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 826.902586] gfs2: invalid mount option: lockpr%to=lock_nolock [ 826.913052] gfs2: can't parse mount arguments 03:33:22 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockpro\no=lock_nolock'}, {@localflocks='localflocks'}]}) 03:33:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1fc, 0x0) 03:33:22 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x20000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:22 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4040) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e22, @remote}, {0x306, @remote}, 0x40, {0x2, 0x4e20, @loopback}}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 827.055696] gfs2: invalid mount option: lockpro [ 827.055696] o=lock_nolock [ 827.063130] gfs2: can't parse mount arguments 03:33:22 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 827.107526] hfs: can't find a HFS filesystem on dev loop6 [ 827.140916] gfs2: invalid mount option: lockpro [ 827.140916] o=lock_nolock [ 827.148448] gfs2: can't parse mount arguments [ 827.155456] hfs: can't find a HFS filesystem on dev loop6 03:33:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x3]}}, 0x1c) 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xa1, 0x0) 03:33:23 executing program 5: mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x400071, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000523000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x1b, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400000, 0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x81, "5344725ed586e4fe1ee9a82ec230466b659891e940994846d08a16692ce241f4fe388f5ef87315938fa63c79dcd113653a5a202187e52cb79325534c2e7ad0403561d128e3f8c31e6b201341d66b6478f05f9d5d913981a744af2c2c9af3393674bcae2ea0354c1b508240130f6815a3fe5d345a186b804ed71f299b5cfef85207"}, &(0x7f0000000100)=0x89) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x10000, 0x10}, &(0x7f0000000180)=0xc) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) time(&(0x7f00000001c0)) 03:33:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockpro%o=lock_nolock'}, {@localflocks='localflocks'}]}) 03:33:23 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x3f00}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1d, 0x0) 03:33:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:23 executing program 0: 03:33:23 executing program 0: [ 827.749392] gfs2: invalid mount option: lockpro%o=lock_nolock [ 827.755376] gfs2: can't parse mount arguments [ 827.781483] hfs: can't find a HFS filesystem on dev loop6 03:33:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = getpgrp(0x0) capget(&(0x7f0000000000)={0x20071026, r1}, &(0x7f0000000040)={0x5, 0x5, 0x20, 0x4, 0x9, 0x7}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @remote}, &(0x7f0000000100)=0xc) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x1d, r3}, 0x10, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0200200000010000d805000000000000", @ANYRES64=r4, @ANYRES64=r5/1000+10000, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="010000a001000000000000400800000019857440f40a6d47"], 0x48}, 0x1, 0x0, 0x0, 0x20040000}, 0x80) 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x12a, 0x0) 03:33:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 827.840782] hfs: can't find a HFS filesystem on dev loop6 [ 827.856073] gfs2: invalid mount option: lockpro%o=lock_nolock [ 827.862043] gfs2: can't parse mount arguments 03:33:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xff000000]}}, 0x1c) 03:33:23 executing program 0: 03:33:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproHo=lock_nolock'}, {@localflocks='localflocks'}]}) 03:33:23 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xa00}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc8bd250f46be57d060") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) open(&(0x7f0000000000)='./file0\x00', 0x20001, 0x0) 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x6d, 0x0) [ 828.011598] gfs2: invalid mount option: lockproHo=lock_nolock [ 828.017646] gfs2: can't parse mount arguments [ 828.035907] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 03:33:23 executing program 0: 03:33:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 828.057110] hfs: can't find a HFS filesystem on dev loop6 03:33:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xced9, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x1, 0x7, 0xfffffffffffffffd, 0x36, 'syz0\x00', 0xfff}) [ 828.113535] hfs: can't find a HFS filesystem on dev loop6 [ 828.125567] gfs2: invalid mount option: lockproHo=lock_nolock [ 828.131503] gfs2: can't parse mount arguments 03:33:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x38, 0x0) 03:33:23 executing program 0: 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x151, 0x0) 03:33:23 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") getpid() ioprio_set$pid(0x1, 0x0, 0x7fff) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) 03:33:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockprot\n=lock_nolock'}, {@localflocks='localflocks'}]}) [ 828.310965] gfs2: invalid mount option: lockprot [ 828.310965] =lock_nolock [ 828.318395] gfs2: can't parse mount arguments [ 828.402285] gfs2: invalid mount option: lockprot [ 828.402285] =lock_nolock [ 828.402760] hfs: can't find a HFS filesystem on dev loop6 [ 828.409769] gfs2: can't parse mount arguments [ 828.476238] hfs: can't find a HFS filesystem on dev loop6 03:33:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x40c10300]}}, 0x1c) 03:33:24 executing program 0: 03:33:24 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x5) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0xea) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x40}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="1237e02760ef9aa94a2a0b1f20c0f32343"], &(0x7f0000000100)=0x1a) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000240)=0x40) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={r2, @in={{0x2, 0x4e22, @broadcast}}, 0x6, 0x9a, 0x3b, 0x290e67c9}, 0x98) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000180)=0x7, 0x2) 03:33:24 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x160, 0x0) 03:33:24 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4c01000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:24 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockprot%=lock_nolock'}, {@localflocks='localflocks'}]}) 03:33:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xf0, 0x0) 03:33:24 executing program 0: [ 828.858122] gfs2: invalid mount option: lockprot%=lock_nolock [ 828.864161] gfs2: can't parse mount arguments [ 828.875594] hfs: can't find a HFS filesystem on dev loop6 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x9d, 0x0) [ 828.924720] gfs2: invalid mount option: lockprot%=lock_nolock [ 828.930700] gfs2: can't parse mount arguments [ 828.938830] hfs: can't find a HFS filesystem on dev loop6 03:33:24 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x54, 0x0) 03:33:24 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x1000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 828.965037] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 03:33:24 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto\nlock_nolock'}, {@localflocks='localflocks'}]}) 03:33:24 executing program 5: r0 = socket$inet6(0xa, 0x80000, 0x10000) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x10200000400004) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) ioctl(r0, 0x5d, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x802) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) 03:33:24 executing program 0: [ 829.121051] gfs2: invalid mount option: lockproto [ 829.121051] lock_nolock [ 829.121904] hfs: can't find a HFS filesystem on dev loop6 [ 829.128451] gfs2: can't parse mount arguments [ 829.185732] gfs2: invalid mount option: lockproto [ 829.185732] lock_nolock [ 829.193315] gfs2: can't parse mount arguments [ 829.207498] hfs: can't find a HFS filesystem on dev loop6 03:33:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfec0000000000000]}}, 0x1c) 03:33:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x12f, 0x0) 03:33:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r1, &(0x7f0000000100)={0x18, 0x2, {0x1, @loopback}}, 0x1e) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setregid(r2, r3) 03:33:25 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x141, 0x0) 03:33:25 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x40000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:25 executing program 0: 03:33:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto%lock_nolock'}, {@localflocks='localflocks'}]}) 03:33:25 executing program 0: [ 829.803105] gfs2: invalid mount option: lockproto%lock_nolock [ 829.809127] gfs2: can't parse mount arguments [ 829.815523] hfs: can't find a HFS filesystem on dev loop6 [ 829.838846] nla_parse: 18 callbacks suppressed [ 829.838857] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x2a, 0x0) 03:33:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffc) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4080, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000040)={0x7f, 0x1, 0xa0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @mcast1, @remote, 0x100000001, 0xe9, 0xfff, 0x0, 0x6, 0x10200, r2}) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0xff, {0x1af, 0x40, 0x100, 0x9, 0x5, 0x8}, 0x5cb4, 0x800}, 0xe) 03:33:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x8e, 0x0) [ 829.870197] gfs2: invalid mount option: lockproto%lock_nolock [ 829.874041] hfs: can't find a HFS filesystem on dev loop6 [ 829.876173] gfs2: can't parse mount arguments 03:33:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=/ock_nolock'}, {@localflocks='localflocks'}]}) 03:33:25 executing program 0: [ 829.917878] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 829.929207] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:25 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}, 0x0}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") clock_adjtime(0x5, &(0x7f0000000000)={0xc6, 0x5, 0x200, 0x5, 0xffffffff, 0xfffffffffffffffe, 0x62, 0x1, 0x818, 0xfffffffffffffffc, 0x7, 0x1, 0x9, 0x0, 0x7fffffff, 0x6, 0x1, 0x3ea7, 0x8, 0x7, 0x8fb9, 0x6f2b, 0x10001, 0x4, 0x3, 0x16e}) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x100, 0x2) write$P9_RLCREATE(r1, &(0x7f0000000140)={0x18, 0xf, 0x1, {{0x0, 0x1, 0x2}, 0x7ff}}, 0x18) syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 829.992944] attempt to access beyond end of device [ 829.997996] loop3: rw=4096, want=136, limit=5 [ 830.002563] gfs2: error 10 reading superblock [ 830.089570] attempt to access beyond end of device [ 830.094803] loop3: rw=4096, want=136, limit=5 [ 830.099396] gfs2: error 10 reading superblock [ 830.144033] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 830.159206] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x800000000000000]}}, 0x1c) 03:33:26 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xe0000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:26 executing program 0: 03:33:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1a9, 0x0) 03:33:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x50, 0x0) 03:33:26 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=%ock_nolock'}, {@localflocks='localflocks'}]}) 03:33:26 executing program 5: 03:33:26 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x40000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:26 executing program 0: 03:33:26 executing program 5: [ 830.746929] attempt to access beyond end of device [ 830.752009] loop3: rw=4096, want=136, limit=5 [ 830.756612] gfs2: error 10 reading superblock [ 830.761430] hfs: can't find a HFS filesystem on dev loop6 [ 830.772034] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x12f, 0x0) 03:33:26 executing program 0: [ 830.817633] hfs: can't find a HFS filesystem on dev loop6 [ 830.821507] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 830.834670] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 830.850844] attempt to access beyond end of device [ 830.855911] loop3: rw=4096, want=136, limit=5 [ 830.860486] gfs2: error 10 reading superblock 03:33:26 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffffffffffffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1f5, 0x0) 03:33:26 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0xa0010000000000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:26 executing program 5: [ 831.036139] hfs: unable to parse mount options [ 831.074007] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 831.093287] hfs: unable to parse mount options [ 831.098878] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1100000000000000]}}, 0x1c) 03:33:27 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=*ock_nolock'}, {@localflocks='localflocks'}]}) 03:33:27 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x1000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:27 executing program 0: 03:33:27 executing program 5: 03:33:27 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x1000000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x18d, 0x0) 03:33:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1b, 0x0) 03:33:27 executing program 0: 03:33:27 executing program 5: [ 831.678641] attempt to access beyond end of device [ 831.680988] hfs: can't find a HFS filesystem on dev loop6 [ 831.683740] loop3: rw=4096, want=136, limit=5 [ 831.693851] gfs2: error 10 reading superblock [ 831.715860] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x4, 0x0) 03:33:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1a2, 0x0) 03:33:27 executing program 0: [ 831.744313] hfs: can't find a HFS filesystem on dev loop6 [ 831.754918] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 831.778459] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 03:33:27 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0xa0010000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:27 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x23000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:27 executing program 5: [ 831.837660] attempt to access beyond end of device [ 831.842705] loop3: rw=4096, want=136, limit=5 [ 831.847261] gfs2: error 10 reading superblock [ 831.958283] hfs: can't find a HFS filesystem on dev loop6 [ 831.980933] hfs: can't find a HFS filesystem on dev loop6 03:33:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x14000000]}}, 0x1c) 03:33:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x186, 0x0) 03:33:28 executing program 0: 03:33:28 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=+ock_nolock'}, {@localflocks='localflocks'}]}) 03:33:28 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0xffffffffa0010000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:28 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchmodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) r2 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='./file0/file0\x00', &(0x7f00009b9000)="0500de00667300", 0x1008, &(0x7f0000000100)) futimesat(r2, &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)={{}, {0x77359400}}) 03:33:28 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x48000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:28 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x66, 0x0) [ 832.606289] attempt to access beyond end of device [ 832.611391] loop3: rw=4096, want=136, limit=5 [ 832.613783] hfs: can't find a HFS filesystem on dev loop6 [ 832.615943] gfs2: error 10 reading superblock 03:33:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/dev_mcast\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 03:33:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x18c, 0x0) 03:33:28 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x3b9ac9ff, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 832.647851] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 03:33:28 executing program 5: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a4a000), &(0x7f00007c4000)) 03:33:28 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x12c, 0x0) [ 832.693054] attempt to access beyond end of device [ 832.698631] loop3: rw=4096, want=136, limit=5 [ 832.703186] gfs2: error 10 reading superblock [ 832.712310] hfs: can't find a HFS filesystem on dev loop6 03:33:28 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0xa00100, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:28 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=.ock_nolock'}, {@localflocks='localflocks'}]}) 03:33:28 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfcfdffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 832.880533] attempt to access beyond end of device [ 832.885613] loop3: rw=4096, want=136, limit=5 [ 832.890189] gfs2: error 10 reading superblock [ 832.913066] hfs: unable to parse mount options [ 832.936085] attempt to access beyond end of device [ 832.937874] hfs: unable to parse mount options [ 832.941123] loop3: rw=4096, want=136, limit=5 [ 832.950282] gfs2: error 10 reading superblock 03:33:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1400]}}, 0x1c) 03:33:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x173, 0x0) 03:33:28 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xa3, 0x0) 03:33:28 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=Lock_nolock'}, {@localflocks='localflocks'}]}) 03:33:28 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x10, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000040), 0x6) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 03:33:28 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x1a0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:28 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xe}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000040)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe0060000000000000100000003ca00000f7f890000002000000001046f0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) recvmmsg(r1, &(0x7f0000002dc0)=[{{&(0x7f0000000cc0)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/181, 0xb5}}], 0x4, 0x0, 0x0) 03:33:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xce, 0x0) 03:33:29 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x70, 0x0) [ 833.518996] attempt to access beyond end of device [ 833.524052] loop3: rw=4096, want=136, limit=5 [ 833.528608] gfs2: error 10 reading superblock [ 833.549079] print_req_error: I/O error, dev loop6, sector 0 [ 833.555290] Buffer I/O error on dev loop6, logical block 0, lost async page write 03:33:29 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6800}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:29 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0xffc99a3b, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 833.576578] attempt to access beyond end of device [ 833.581689] loop3: rw=4096, want=136, limit=5 [ 833.586249] gfs2: error 10 reading superblock [ 833.608732] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 03:33:29 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=-ock_nolock'}, {@localflocks='localflocks'}]}) 03:33:29 executing program 0: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pipe(&(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a4a000), &(0x7f00007c4000)) 03:33:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x86, 0x0) [ 833.658396] hfs: can't find a HFS filesystem on dev loop6 03:33:29 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x187, 0x0) [ 833.700827] hfs: can't find a HFS filesystem on dev loop6 [ 833.751795] attempt to access beyond end of device [ 833.756886] loop3: rw=4096, want=136, limit=5 [ 833.761452] gfs2: error 10 reading superblock [ 833.824721] attempt to access beyond end of device [ 833.829825] loop3: rw=4096, want=136, limit=5 [ 833.834614] gfs2: error 10 reading superblock 03:33:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfc00]}}, 0x1c) 03:33:29 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x1a0ffffffff, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:29 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=uock_nolock'}, {@localflocks='localflocks'}]}) 03:33:29 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xac, 0x0) 03:33:29 executing program 0: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pipe(&(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000659ffe), &(0x7f00003c6ffc), &(0x7f0000a4a000), &(0x7f00007c4000)) 03:33:29 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x137, 0x0) 03:33:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000040)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe0060000000000000100000003ca00000f7f890000002000000001046f0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) recvmmsg(r1, &(0x7f0000002dc0)=[{{&(0x7f0000000cc0)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/181, 0xb5}}], 0x4, 0x0, 0x0) 03:33:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x192, 0x0) 03:33:29 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0xffc99a3b00000000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 834.460363] attempt to access beyond end of device [ 834.465466] loop3: rw=4096, want=136, limit=5 [ 834.470039] gfs2: error 10 reading superblock [ 834.478449] hfs: can't find a HFS filesystem on dev loop6 03:33:29 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x6, 0x0) [ 834.527816] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 834.541132] hfs: can't find a HFS filesystem on dev loop6 [ 834.567193] attempt to access beyond end of device [ 834.572256] loop3: rw=4096, want=136, limit=5 03:33:30 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x42440000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 834.576863] gfs2: error 10 reading superblock 03:33:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xb2, 0x0) 03:33:30 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@localflocks='localflocks'}]}) [ 834.647026] hfs: can't find a HFS filesystem on dev loop6 03:33:30 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x1400000000000000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x16, 0x0) [ 834.693654] hfs: can't find a HFS filesystem on dev loop6 [ 834.723949] attempt to access beyond end of device [ 834.729034] loop3: rw=4096, want=136, limit=5 [ 834.733613] gfs2: error 10 reading superblock [ 834.796870] attempt to access beyond end of device [ 834.801912] loop3: rw=4096, want=136, limit=5 [ 834.806460] gfs2: error 10 reading superblock 03:33:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfec0]}}, 0x1c) 03:33:30 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4e010000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x3a, 0x0) 03:33:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x83, 0x0) 03:33:30 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x4000000000000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000002380)=[{{&(0x7f00000000c0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/235, 0xeb}], 0x1, &(0x7f0000000640)=""/22, 0x16}}], 0x1, 0x0, &(0x7f00000025c0)) 03:33:30 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=0ock_nolock'}, {@localflocks='localflocks'}]}) 03:33:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=uock_nolock'}, {@localflocks='localflocks'}]}) [ 835.346406] hfs: can't find a HFS filesystem on dev loop6 [ 835.353136] attempt to access beyond end of device [ 835.358161] loop3: rw=4096, want=136, limit=5 [ 835.359634] attempt to access beyond end of device [ 835.362714] gfs2: error 10 reading superblock [ 835.372227] loop5: rw=4096, want=136, limit=5 [ 835.376803] gfs2: error 10 reading superblock [ 835.382541] nla_parse: 18 callbacks suppressed [ 835.382553] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x16d, 0x0) 03:33:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x34, 0x0) 03:33:30 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4800}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 835.408512] hfs: can't find a HFS filesystem on dev loop6 [ 835.418103] attempt to access beyond end of device [ 835.423238] loop3: rw=4096, want=136, limit=5 [ 835.424064] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 835.427781] gfs2: error 10 reading superblock 03:33:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfc]}}, 0x1c) 03:33:30 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x100000000000000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:30 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=#ock_nolock'}, {@localflocks='localflocks'}]}) 03:33:31 executing program 5: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6800}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x53, 0x0) [ 835.567603] hfs: can't find a HFS filesystem on dev loop6 03:33:31 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xaa, 0x0) [ 835.619859] hfs: can't find a HFS filesystem on dev loop6 [ 835.621202] hfs: can't find a HFS filesystem on dev loop5 [ 835.631286] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 835.658225] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xc]}}, 0x1c) [ 835.671190] attempt to access beyond end of device [ 835.676213] loop3: rw=4096, want=136, limit=5 [ 835.680788] gfs2: error 10 reading superblock 03:33:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x13, 0x0) 03:33:31 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6c}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:31 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x14000000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 835.771834] attempt to access beyond end of device [ 835.776856] loop3: rw=4096, want=136, limit=5 [ 835.781400] gfs2: error 10 reading superblock [ 835.827672] hfs: unable to parse mount options [ 835.860649] hfs: unable to parse mount options [ 835.872269] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 835.899890] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:31 executing program 0: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6c}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)=""/65, &(0x7f0000000100)=0x41) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{}, {}, {}]}) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000000)=0x54, 0x4) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r3) 03:33:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x8dffffff00000000]}}, 0x1c) 03:33:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1db, 0x0) 03:33:31 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=l\nck_nolock'}, {@localflocks='localflocks'}]}) 03:33:31 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x1400, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:31 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1a3, 0x0) 03:33:31 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x14e}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 836.182730] attempt to access beyond end of device [ 836.187871] loop3: rw=4096, want=136, limit=5 [ 836.192454] gfs2: error 10 reading superblock [ 836.198878] hfs: unable to parse mount options [ 836.203211] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 836.220096] hfs: unable to parse mount options 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)=""/65, &(0x7f0000000100)=0x41) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{}, {}, {}]}) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000000)=0x54, 0x4) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r3) [ 836.225523] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 836.246873] hfs: unable to parse mount options [ 836.251685] attempt to access beyond end of device [ 836.256839] loop3: rw=4096, want=136, limit=5 [ 836.261390] gfs2: error 10 reading superblock 03:33:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x77359400}, 0x10) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:20 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x800000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 836.284254] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x60, 0x0) 03:33:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x4, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=l%ck_nolock'}, {@localflocks='localflocks'}]}) 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)=""/65, &(0x7f0000000100)=0x41) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{}, {}, {}]}) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000000)=0x54, 0x4) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r3) [ 836.420783] hfs: can't find a HFS filesystem on dev loop6 03:33:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x77359400}, 0x10) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x103, 0x0) [ 836.483155] hfs: can't find a HFS filesystem on dev loop6 [ 836.507797] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 836.535047] attempt to access beyond end of device [ 836.538175] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 836.540113] loop3: rw=4096, want=136, limit=5 [ 836.540129] gfs2: error 10 reading superblock 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)=""/65, &(0x7f0000000100)=0x41) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{}, {}, {}]}) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000000)=0x54, 0x4) fstat(r2, &(0x7f0000000180)) [ 836.624450] attempt to access beyond end of device [ 836.629531] loop3: rw=4096, want=136, limit=5 [ 836.634142] gfs2: error 10 reading superblock 03:33:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd00000000000000]}}, 0x1c) 03:33:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x8e, 0x0) 03:33:20 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xf6ffffff00000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x1a000, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lo\nk_nolock'}, {@localflocks='localflocks'}]}) 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)=""/65, &(0x7f0000000100)=0x41) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{}, {}, {}]}) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000000)=0x54, 0x4) 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x5f, 0x0) 03:33:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x77359400}, 0x10) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) [ 837.032176] hfs: can't find a HFS filesystem on dev loop6 [ 837.047820] attempt to access beyond end of device [ 837.052882] loop3: rw=4096, want=136, limit=5 [ 837.057464] gfs2: error 10 reading superblock 03:33:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x10e, 0x0) [ 837.106832] hfs: can't find a HFS filesystem on dev loop6 [ 837.126927] attempt to access beyond end of device [ 837.132035] loop3: rw=4096, want=136, limit=5 [ 837.136595] gfs2: error 10 reading superblock 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x92, 0x0) 03:33:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x14, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 837.149550] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)=""/65, &(0x7f0000000100)=0x41) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{}, {}, {}]}) 03:33:20 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6800000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lo%k_nolock'}, {@localflocks='localflocks'}]}) 03:33:20 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) [ 837.357267] hfs: can't find a HFS filesystem on dev loop6 [ 837.364414] attempt to access beyond end of device [ 837.369567] loop3: rw=4096, want=136, limit=5 [ 837.374147] gfs2: error 10 reading superblock [ 837.420281] hfs: can't find a HFS filesystem on dev loop6 [ 837.448000] attempt to access beyond end of device [ 837.453266] loop3: rw=4096, want=136, limit=5 [ 837.457817] gfs2: error 10 reading superblock 03:33:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xff00000000000000]}}, 0x1c) 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)=""/65, &(0x7f0000000100)=0x41) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) socket$bt_rfcomm(0x1f, 0x3, 0x3) 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xd9, 0x0) 03:33:20 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x7000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) fcntl$setflags(r0, 0x2, 0x1) 03:33:20 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=loc\n_nolock'}, {@localflocks='localflocks'}]}) 03:33:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xe7, 0x0) 03:33:20 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) [ 837.978866] attempt to access beyond end of device [ 837.983963] loop3: rw=4096, want=136, limit=5 [ 837.988526] gfs2: error 10 reading superblock [ 837.998056] hfs: can't find a HFS filesystem on dev loop6 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)=""/65, &(0x7f0000000100)=0x41) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xa3, 0x0) 03:33:20 executing program 4: r0 = socket$inet(0x10, 0x800, 0x100000001) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x198, 0x0) [ 838.032890] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 838.057859] hfs: can't find a HFS filesystem on dev loop6 03:33:20 executing program 0: ioctl(0xffffffffffffffff, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) [ 838.094324] attempt to access beyond end of device [ 838.099417] loop3: rw=4096, want=136, limit=5 [ 838.104035] gfs2: error 10 reading superblock 03:33:20 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x97ffffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1e, &(0x7f0000000080)=""/65, &(0x7f0000000100)=0x41) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) [ 838.285929] hfs: unable to parse mount options [ 838.317517] hfs: unable to parse mount options 03:33:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x55550000]}}, 0x1c) 03:33:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x13c, 0x0) 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x21f, 0x0) 03:33:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=loc%_nolock'}, {@localflocks='localflocks'}]}) 03:33:20 executing program 0: ioctl(0xffffffffffffffff, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:20 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x260, &(0x7f0000000480)=[{&(0x7f00000000c0)="d01a5d0857472a7bfb358c85293284fc438cef3daa5ec4727f8b9cf87e9a3bf6e461f239f8287863dae8c8b686befca9bfd20971852932f4e02b8702a8d90a216d1e56343947f72b9d170cfe290e6c0e7d1cc8660cf908cb112172393c1b80e3b2282b06e8bd7872a071aa1131ec8e146e89246261c6dc099c009fceeacccfc907072c3a"}, {&(0x7f0000000240)="ed3b85ea62bd3ecc4396f78d8fd2629d73a7842370b944d22f9fdf8ba9fa7bc788587dd42900c5cbce65d2ad1031ce8f623cb2c27cebf771d59f99ccecf2243a16cee77b16f7c5ced3f79f60978133be30f5cb9ff7a339f7eac4b960abee227c7aa9e452293740ce5b3e978f7a332813e9ef7e5c219f2600459236ec61e8e11a9ba808318a47e09d"}, {&(0x7f0000000580)="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"}, {&(0x7f0000001bc0)="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"}, {&(0x7f0000000300)="8ace9b9dd2ebcfdc24848d915a779f9ecc928b1aae33d41b042834686346e08cc940e052cd752d5cad6a17d7dbb58be7f6c8df3b42c9b94874b74096c8151dd3fc8acc95158bbdbdeab3057b5c48d512c14167b6b4b36495d89082a5f2825adbc10e51fbaeb6c037a23d", 0x38a}, {&(0x7f0000000380)="62126c784b58736dce6d258d969f363d591bf0fbad6ad3514f68bb589879631b9c040ea6583e6e46d0de98bdb1e4d38c6566a4950e7ad6f64d488992a0f49709b8103819863944a6b7801c613329fb292428110bfa74157cc934d9bf44faa251aa7f11554abe8fce0eac16dc074b8e3049f0e54716529c1be322f71f1c8c6081444cf85e623d7481172418256311b0a8677600852d6e3f9c6db95b3c9f5c36014d20c521db56c9652dff10abeb015cd496c7ffe488feaa44cb47dc23a2e0d9a512090ede984783cfa2fa8c62ddd4c62553e6a983809f4afaf81873ef83471c07b9c80055056e61fd"}], 0x364}, 0x4000001) 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101180, 0x4) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) 03:33:20 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6000000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:20 executing program 0: ioctl(0xffffffffffffffff, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) [ 838.892326] attempt to access beyond end of device [ 838.897429] loop3: rw=4096, want=136, limit=5 [ 838.902019] gfs2: error 10 reading superblock [ 838.915803] hfs: can't find a HFS filesystem on dev loop6 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) 03:33:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x12, 0x0) [ 838.953108] hfs: can't find a HFS filesystem on dev loop6 [ 838.953300] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 838.975406] attempt to access beyond end of device [ 838.980406] loop3: rw=4096, want=136, limit=5 [ 838.984970] gfs2: error 10 reading superblock 03:33:20 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4e01}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:20 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x158, 0x0) 03:33:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_\nolock'}, {@localflocks='localflocks'}]}) 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5dc80700315f85507000e187c7aebeeb3bfc1800ff973b3735e724fd33577dad6e081de77b20d315b61e3b078f603bc23186b2986cdc8f563689ce84cfa914e0e8cd063c8ed1c7a1d79804c7b9e32ee54efc9bc71489797cd6594554d5cb3d818f154454337ebab20068666c0541e24c6a10b843f5d28defb0abd8") set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) [ 839.148816] hfs: unable to parse mount options [ 839.163995] attempt to access beyond end of device [ 839.169088] loop3: rw=4096, want=136, limit=5 [ 839.173648] gfs2: error 10 reading superblock [ 839.197863] hfs: unable to parse mount options [ 839.198413] attempt to access beyond end of device [ 839.207495] loop3: rw=4096, want=136, limit=5 [ 839.212104] gfs2: error 10 reading superblock 03:33:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x10000000]}}, 0x1c) 03:33:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x130, 0x0) 03:33:21 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x1f00}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x137, 0x0) 03:33:21 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) 03:33:21 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:21 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_%olock'}, {@localflocks='localflocks'}]}) 03:33:21 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0xffffffff) [ 839.779681] hfs: can't find a HFS filesystem on dev loop6 [ 839.810375] attempt to access beyond end of device [ 839.815388] loop3: rw=4096, want=136, limit=5 [ 839.819966] gfs2: error 10 reading superblock 03:33:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xe9, 0x0) [ 839.825271] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 03:33:21 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x200000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000240)={0x0, {0x77359400}, 0xc0000}) r1 = socket$inet(0x10, 0x3, 0x40000000000010) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) recvmmsg(r1, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x4) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000040)=0x49) fcntl$setpipe(r0, 0x407, 0x100) socket$bt_hidp(0x1f, 0x3, 0x6) [ 839.856283] hfs: can't find a HFS filesystem on dev loop6 [ 839.893162] attempt to access beyond end of device [ 839.898199] loop3: rw=4096, want=136, limit=5 03:33:21 executing program 5: set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x6) [ 839.902792] gfs2: error 10 reading superblock 03:33:21 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:21 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x48}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xb3, 0x0) 03:33:21 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_n\nlock'}, {@localflocks='localflocks'}]}) [ 840.019212] hfs: unable to parse mount options 03:33:21 executing program 5: set_mempolicy(0x0, &(0x7f0000000200)=0x8, 0x6) [ 840.070780] hfs: unable to parse mount options [ 840.121661] attempt to access beyond end of device [ 840.126700] loop3: rw=4096, want=136, limit=5 [ 840.131311] gfs2: error 10 reading superblock [ 840.171183] attempt to access beyond end of device [ 840.176212] loop3: rw=4096, want=136, limit=5 [ 840.180796] gfs2: error 10 reading superblock 03:33:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfc000000]}}, 0x1c) 03:33:22 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:22 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x400000) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) linkat(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1400) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000280)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000300)=""/173, 0xad}, {&(0x7f0000000580)=""/4096, 0xb09}], 0x100000000000012f, &(0x7f00000001c0)=""/71, 0x47}, 0xfffffffffffffffd}], 0x1, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x87, 0x0) 03:33:22 executing program 5: set_mempolicy(0x0, &(0x7f0000000200)=0x8, 0x6) 03:33:22 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x6}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:22 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_n%lock'}, {@localflocks='localflocks'}]}) 03:33:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x4b, 0x0) [ 840.674160] nla_parse: 10 callbacks suppressed [ 840.674170] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 840.694889] hfs: unable to parse mount options [ 840.704736] attempt to access beyond end of device [ 840.709799] loop3: rw=4096, want=136, limit=5 [ 840.714406] gfs2: error 10 reading superblock 03:33:22 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1af, 0x0) 03:33:22 executing program 5: set_mempolicy(0x0, &(0x7f0000000200)=0x8, 0x6) [ 840.731416] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 840.744185] hfs: unable to parse mount options 03:33:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x15e, 0x0) [ 840.776140] attempt to access beyond end of device [ 840.781209] loop3: rw=4096, want=136, limit=5 [ 840.785763] gfs2: error 10 reading superblock 03:33:22 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3ab, &(0x7f0000017000)=[{&(0x7f0000000040)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:22 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4e01000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:22 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:22 executing program 5: set_mempolicy(0x2, &(0x7f0000000200), 0x6) [ 840.920435] hfs: can't find a HFS filesystem on dev loop6 [ 840.936908] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 840.955979] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 840.984926] hfs: can't find a HFS filesystem on dev loop6 03:33:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfffffff5]}}, 0x1c) 03:33:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_noLock'}, {@localflocks='localflocks'}]}) 03:33:23 executing program 5: set_mempolicy(0x2, &(0x7f0000000200), 0x6) 03:33:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x400000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x1f) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xbf, 0x0) 03:33:23 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xa000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x6d, 0x0) [ 841.567686] attempt to access beyond end of device [ 841.572776] loop3: rw=4096, want=136, limit=5 [ 841.577374] gfs2: error 10 reading superblock [ 841.585657] hfs: can't find a HFS filesystem on dev loop6 [ 841.592076] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:23 executing program 5: set_mempolicy(0x2, &(0x7f0000000200), 0x6) 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x62, 0x0) 03:33:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x158, 0x0) [ 841.615717] hfs: can't find a HFS filesystem on dev loop6 [ 841.632283] attempt to access beyond end of device [ 841.637294] loop3: rw=4096, want=136, limit=5 [ 841.641851] gfs2: error 10 reading superblock 03:33:23 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x10}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xf00]}}, 0x1c) 03:33:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x100000000) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x47}}], 0x1, 0xfffffffffffffffc, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_no#ock'}, {@localflocks='localflocks'}]}) [ 841.761852] hfs: unable to parse mount options 03:33:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:23 executing program 5: set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x0) 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x229, 0x0) [ 841.818906] hfs: unable to parse mount options [ 841.834313] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 841.856103] attempt to access beyond end of device [ 841.861112] loop3: rw=4096, want=136, limit=5 03:33:23 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000640)='syz0\x00') setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000002c0)={0x1}, 0x8) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000140)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x3000}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000240), &(0x7f0000000280)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000440)={0x0, 0xbc, &(0x7f0000000380)=[@in6={0xa, 0x4e21, 0xff, @local, 0x2}, @in6={0xa, 0x4e21, 0x100000000, @local}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, @in6={0xa, 0x4e24, 0x9, @loopback, 0xffffffffffff8000}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x3a3, @ipv4={[], [], @rand_addr=0xffff}, 0x9}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x101}]}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000580)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}, 0x1, 0x1fc0000000000, 0x6, 0x1, 0x84}, &(0x7f00000004c0)=0x98) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xb7, 0xfffffffffffffffe}) utime(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0xf3, 0x4d}) 03:33:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xc0, 0x0) [ 841.865677] gfs2: error 10 reading superblock 03:33:23 executing program 5: set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x0) 03:33:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:23 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x20000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 841.941495] attempt to access beyond end of device [ 841.946546] loop3: rw=4096, want=136, limit=5 [ 841.951106] gfs2: error 10 reading superblock [ 841.974022] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:23 executing program 5: set_mempolicy(0x2, &(0x7f0000000200)=0x8, 0x0) [ 842.014629] hfs: can't find a HFS filesystem on dev loop6 03:33:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x20d, 0x0) 03:33:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_no/ock'}, {@localflocks='localflocks'}]}) [ 842.061684] hfs: can't find a HFS filesystem on dev loop6 [ 842.087620] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:24 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xedc000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 842.188656] attempt to access beyond end of device [ 842.193722] loop3: rw=4096, want=136, limit=5 [ 842.198462] gfs2: error 10 reading superblock [ 842.239929] hfs: can't find a HFS filesystem on dev loop6 [ 842.273709] attempt to access beyond end of device [ 842.278728] loop3: rw=4096, want=136, limit=5 [ 842.283308] gfs2: error 10 reading superblock [ 842.298941] hfs: can't find a HFS filesystem on dev loop6 03:33:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xf401]}}, 0x1c) 03:33:24 executing program 5: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x14e}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:24 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f00000000c0)=0xb) 03:33:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x59, 0x0) 03:33:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xdf, 0x0) 03:33:24 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_no*ock'}, {@localflocks='localflocks'}]}) 03:33:24 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4d500000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 842.668026] hfs: unable to parse mount options [ 842.677654] attempt to access beyond end of device [ 842.682692] loop3: rw=4096, want=136, limit=5 [ 842.687245] gfs2: error 10 reading superblock [ 842.692589] hfs: can't find a HFS filesystem on dev loop6 03:33:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc8070031") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x11c, 0x0) 03:33:24 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x149, 0x0) [ 842.710027] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 842.730148] hfs: can't find a HFS filesystem on dev loop6 [ 842.739046] attempt to access beyond end of device [ 842.741460] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 842.744081] loop3: rw=4096, want=136, limit=5 [ 842.757155] gfs2: error 10 reading superblock 03:33:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x22, 0x0) 03:33:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x900000000000000]}}, 0x1c) 03:33:24 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x8000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc8070031") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:24 executing program 4: r0 = socket$inet(0x10, 0x4, 0x40000000000090) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:24 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_no.ock'}, {@localflocks='localflocks'}]}) 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x6, 0x0) 03:33:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715370") syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) [ 842.911152] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 842.932507] hfs: can't find a HFS filesystem on dev loop6 03:33:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x121, 0x0) 03:33:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc8070031") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:24 executing program 4: r0 = socket$inet(0x10, 0x6, 0x7fffffff) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0xffffffffffffff60}}], 0x9a, 0x0, &(0x7f0000001b80)) signalfd(r0, &(0x7f0000000040)={0x2}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='\x00 \x00\x00\x00') setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="5c761d98afbfd16e77efa1a722ee80448b42d48ebb14e590a0e37b68d25d7f629028ee939d8a2a8143c1471b9d982eba32bb0eedc2bfa6ae654f408776cafb23e4d80c9ad3103ea360c569afa92728c389e5dc46b78915b514c149f1dc5e6cb4375292f887060e44e4c46bac19db573fded8", 0x72) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0x4) [ 842.968186] attempt to access beyond end of device [ 842.973237] loop3: rw=4096, want=136, limit=5 [ 842.977843] gfs2: error 10 reading superblock [ 842.997112] hfs: can't find a HFS filesystem on dev loop6 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1c4, 0x0) 03:33:24 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xfdfdffff}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:24 executing program 5: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x1000) [ 843.053728] attempt to access beyond end of device [ 843.058763] loop3: rw=4096, want=136, limit=5 [ 843.063322] gfs2: error 10 reading superblock 03:33:25 executing program 4: r0 = socket$inet(0x10, 0x3, 0x7a0f) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x47}}], 0x1, 0x2160, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_no\nock'}, {@localflocks='localflocks'}]}) 03:33:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xd7, 0x0) [ 843.171108] hfs: unable to parse mount options [ 843.225513] hfs: unable to parse mount options [ 843.241098] attempt to access beyond end of device [ 843.246134] loop3: rw=4096, want=136, limit=5 [ 843.250690] gfs2: error 10 reading superblock [ 843.331731] attempt to access beyond end of device [ 843.336857] loop3: rw=4096, want=136, limit=5 [ 843.341429] gfs2: error 10 reading superblock 03:33:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5000000]}}, 0x1c) 03:33:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f8571") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xd6, 0x0) 03:33:25 executing program 5: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x1000) 03:33:25 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000300), &(0x7f0000000340)=0x4) r1 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r1, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) r3 = getpgrp(0xffffffffffffffff) r4 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x1, 0x88000) r5 = semget$private(0x0, 0x4, 0x200) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000380)=[0x9, 0x1ff]) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x2) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x6, 0x9, 0x1, 0x2, 0x0, 0xd72, 0xc4209, 0xd, 0x5, 0xe5b, 0x4756, 0x3ff, 0xfffffffffffffffd, 0x0, 0x3, 0x100000000, 0x3, 0x0, 0x0, 0xf832, 0x3, 0x2, 0x400, 0x80000001, 0x8, 0x2, 0x0, 0x100000000, 0x9, 0x100000001, 0x3, 0xfbd, 0x3, 0x2, 0x7, 0x7, 0x0, 0x767c, 0x4, @perf_bp={&(0x7f0000000140), 0x2}, 0x1010, 0xff, 0x7, 0x7, 0x0, 0xfffffffffffffffe, 0x1}, r2, 0xf, r4, 0x2) rt_tgsigqueueinfo(r2, r3, 0x2, &(0x7f00000000c0)={0x3d, 0xfffffffffffffffd, 0x7, 0x3}) socket$bt_rfcomm(0x1f, 0x0, 0x3) 03:33:25 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x4c01}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x128, 0x0) 03:33:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_no-ock'}, {@localflocks='localflocks'}]}) [ 843.753034] attempt to access beyond end of device [ 843.758117] loop3: rw=4096, want=136, limit=5 [ 843.762714] gfs2: error 10 reading superblock [ 843.772582] hfs: unable to parse mount options [ 843.784942] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 843.798779] hfs: unable to parse mount options 03:33:25 executing program 5: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x1000) 03:33:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x84, 0x0) 03:33:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f8571") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) [ 843.810939] netlink: 16 bytes leftover after parsing attributes in process `syz-executor4'. [ 843.821715] attempt to access beyond end of device [ 843.826745] loop3: rw=4096, want=136, limit=5 [ 843.831408] gfs2: error 10 reading superblock 03:33:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x153, 0x0) 03:33:25 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) setsockopt$inet_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080)=0x9, 0x4) timer_create(0x2, &(0x7f0000000500)={0x0, 0x35, 0x4, @thr={&(0x7f00000003c0)="3dd29eb586198e2775f13ed6dfabf6e94f0bab9046f93c027eaa9a3feddcd55cbaf7bbfa725f97c5f5571b83d02f39fb937b06ac28a5017cc58376987005e5ed4da0171c7c79f1e4146b3e5c75a91e73cd72396a50dad4b30196ee73842371e1e5d8d78435954c3c8d0871a00522134f61b00ee91ebeae6f0277212ee79cc49b797014258d3e9bbfdda39b38e88dc5c9b8f7cf2ee71bb76a2c1ec8a1480c7d69fbae991ed791ee00dec8195208c265ec8957f9db376b1b84e9b8c4e96560a2e56ea6b268e171eb440d23034cba51b977d363e2029664f2c290aa8cd6cb62ec82dc40111003cadc4cad0a1454b7", &(0x7f00000001c0)="cca4271355898adec0d8e1479f2b3f4ab703ba8960693c6e030b0ddef1b899bbfc1a2d1b4dcf57f4ee209a9e"}}, &(0x7f0000000540)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) syz_mount_image$bfs(&(0x7f0000000700)='bfs\x00', &(0x7f0000000740)='./file0\x00', 0x2b, 0x1, &(0x7f0000000840)=[{&(0x7f0000000780)="f06844a52569274ceffea9062082254701808032211c548254dc7dfc43a471b1b9a69d56cb7ea66c0897770ae107023bcf81b36e77f4295f7f16f927d74fc90bc17e50567f326e255ddb3ead8d7b1e0f370b15930e58c3a47c9ba299a3390a9bb143a1666288ce729f1db724a833999f8c9d5353d3fe629fccc808bfafbe0f22132a874ad08cccc6e664965c53a35388b1e1c961d5c880d2b132c3e7d7e8cc96", 0xa0, 0x1a5}], 0x1000008, 0x0) getitimer(0x2, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x5, 0x20, 0x10001}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r3, 0x3}, &(0x7f0000000580)=0x4eb6453bb2f77d52) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000005c0)={r4, 0x8000}, &(0x7f0000000600)=0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000680)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r4, 0x294b, 0x30}, &(0x7f00000002c0)=0xc) accept$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0xfffffffffffffde6) recvmmsg(r0, &(0x7f0000000080), 0x1, 0x40000, &(0x7f0000001b80)) sendto$inet(r2, &(0x7f0000000140)="40d7e1c5df313aca52ad37bf71e35327a3cb870f0d94d9cc2aac20e4afc460f21bb0deb4566e9f983fc6bf0b6189c137", 0x30, 0x8000, &(0x7f00000004c0)={0x2, 0x4e23, @multicast1}, 0x10) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x157, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}]}, 0x0) 03:33:25 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x700}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") [ 843.878645] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 03:33:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_no0ock'}, {@localflocks='localflocks'}]}) 03:33:25 executing program 5: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x1000) [ 844.003418] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 844.015433] hfs: can't find a HFS filesystem on dev loop6 [ 844.026603] attempt to access beyond end of device [ 844.031687] loop3: rw=4096, want=136, limit=5 [ 844.036241] gfs2: error 10 reading superblock [ 844.072563] hfs: can't find a HFS filesystem on dev loop6 [ 844.107816] attempt to access beyond end of device [ 844.112869] loop3: rw=4096, want=136, limit=5 [ 844.117500] gfs2: error 10 reading superblock 03:33:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xe703]}}, 0x1c) 03:33:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f8571") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:26 executing program 5: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x1000) 03:33:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1a0, 0x0) 03:33:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x177, 0x0) 03:33:26 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x7a00}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:26 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_no%ock'}, {@localflocks='localflocks'}]}) 03:33:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f857150") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:26 executing program 5: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x1000) [ 844.741181] hfs: can't find a HFS filesystem on dev loop6 [ 844.743549] attempt to access beyond end of device [ 844.751812] loop3: rw=4096, want=136, limit=5 [ 844.756389] gfs2: error 10 reading superblock 03:33:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xc, 0x0) [ 844.794317] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=00000000) [ 844.808249] hfs: can't find a HFS filesystem on dev loop6 03:33:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x3e7]}}, 0x1c) 03:33:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x14b, 0x0) [ 844.841183] attempt to access beyond end of device [ 844.846227] loop3: rw=4096, want=136, limit=5 [ 844.850788] gfs2: error 10 reading superblock 03:33:26 executing program 5: socket$inet6(0xa, 0xffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x1000) 03:33:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f857150") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:26 executing program 4: r0 = socket$inet(0x10, 0xa, 0x40000000000010) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x210100) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000000c0)=0x2c, 0x4) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x38b, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x1, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000001bc0)={0x0, 0x0, 0x2080}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000100)={0x5, 0x800, 0x27, 0x80, 0x2, 0x488e654f, 0xea4, 0x5, 0x56e7b422, 0xfffffffffffffffa, 0xcd, 0x1}) 03:33:26 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffffff97}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:26 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_no+ock'}, {@localflocks='localflocks'}]}) 03:33:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0x1bf, 0x0) 03:33:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x2b2]}}, 0x1c) [ 845.011213] hfs: unable to parse mount options 03:33:26 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xd00000000000000, &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[{@nobarrier='nobarrier'}]}) r0 = socket$inet(0x10, 0x1, 0x94) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 03:33:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x119, 0x0) 03:33:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f857150") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84) 03:33:26 executing program 5: r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x800) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x1000) [ 845.042744] attempt to access beyond end of device [ 845.047794] loop3: rw=4096, want=136, limit=5 [ 845.052384] gfs2: error 10 reading superblock [ 845.069692] hfs: unable to parse mount options [ 845.108913] attempt to access beyond end of device [ 845.113945] loop3: rw=4096, want=136, limit=5 [ 845.118497] gfs2: error 10 reading superblock 03:33:27 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0x200000000000000}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:27 executing program 5: r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x1000) 03:33:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0xcd, 0x0) 03:33:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x84) 03:33:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xe]}}, 0x1c) 03:33:27 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nouock'}, {@localflocks='localflocks'}]}) 03:33:27 executing program 5: syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x1000) [ 845.288733] hfs: can't find a HFS filesystem on dev loop6 [ 845.326719] hfsplus: unable to parse mount options [ 845.328943] attempt to access beyond end of device 03:33:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 03:33:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f000063a000)=0x2be, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x1000000, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x91ffffff00000000]}}, 0x1c) 03:33:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x102, 0x0) [ 845.336758] loop3: rw=4096, want=136, limit=5 [ 845.341324] gfs2: error 10 reading superblock [ 845.366734] hfs: can't find a HFS filesystem on dev loop6 [ 845.415158] attempt to access beyond end of device [ 845.416812] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 845.420180] loop3: rw=4096, want=136, limit=5 [ 845.434714] gfs2: error 10 reading superblock 03:33:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=ANY=[], 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r0, &(0x7f00000017c0), 0xb, 0x0) 03:33:27 executing program 5: r0 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) 03:33:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100000000008912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 03:33:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x600, 0x0) poll(&(0x7f0000000100)=[{r0, 0x2}, {r1, 0x400}], 0x2, 0x4) r2 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r2, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x5, 0x3, 0x4) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) 03:33:27 executing program 6: syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000300)='./file0\x00', 0xc7, 0x1, &(0x7f0000001840)=[{&(0x7f0000001780)}], 0x0, &(0x7f0000001940)={[{@iocharset={'iocharset', 0x3d, 'cp862'}}], 0xffffffffffff0700}) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") 03:33:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x65, 0x0) 03:33:27 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0xaa5, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000540)={[{@lockproto_nolock='lockproto=lock_nol\nck'}, {@localflocks='localflocks'}]}) [ 845.575858] divide error: 0000 [#1] SMP KASAN [ 845.580406] CPU: 1 PID: 16670 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #216 [ 845.587785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.597160] RIP: 0010:nbd_ioctl+0x53c/0xcf0 [ 845.601492] Code: ea 03 80 3c 02 00 0f 85 1c 07 00 00 48 8b b5 c0 fe ff ff 48 63 8d b8 fe ff ff 48 8b 86 c8 00 00 00 48 8d be c0 00 00 00 48 99 <48> f7 f9 48 ba 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 80 3c [ 845.620408] RSP: 0018:ffff8801b942f828 EFLAGS: 00010246 03:33:27 executing program 4: r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000001c0)=""/71, 0x16b}}], 0x9a, 0x0, &(0x7f0000001b80)) socket$inet(0x2, 0xa, 0x8) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000000180)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 845.625778] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 845.633055] RDX: 0000000000000000 RSI: ffff8801d0f75280 RDI: ffff8801d0f75340 [ 845.640336] RBP: ffff8801b942f9a0 R08: ffff880189416500 R09: ffffed003a634b0d [ 845.647615] R10: ffff8801b942f818 R11: ffff8801d31a586f R12: ffff8801d31a5780 [ 845.654892] R13: 00000000ffffffe7 R14: ffff8801d31a5860 R15: ffff8801bbe52240 [ 845.662175] FS: 00007fb51fa9c700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 845.670410] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 845.676300] CR2: 0000000000726cec CR3: 00000001c587e000 CR4: 00000000001406e0 [ 845.683582] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 845.690858] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 845.698126] Call Trace: [ 845.700731] ? nbd_release+0x140/0x140 [ 845.704626] ? graph_lock+0x170/0x170 [ 845.708440] ? trace_hardirqs_on+0xbd/0x2c0 [ 845.712768] ? kasan_check_read+0x11/0x20 [ 845.716927] ? finish_task_switch+0x1d3/0x870 [ 845.721428] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 845.726542] ? compat_start_thread+0x80/0x80 [ 845.729662] syz-executor4 uses obsolete (PF_INET,SOCK_PACKET) [ 845.730968] ? find_held_lock+0x36/0x1c0 [ 845.730987] ? nbd_release+0x140/0x140 [ 845.731022] blkdev_ioctl+0x9cd/0x2030 [ 845.748709] ? blkpg_ioctl+0xc40/0xc40 [ 845.752603] ? __switch_to_asm+0x40/0x70 [ 845.756674] ? kasan_check_read+0x11/0x20 [ 845.760824] ? rcu_is_watching+0x8c/0x150 [ 845.764973] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 845.769661] ? __fget+0x4d5/0x740 [ 845.773123] ? ksys_dup3+0x690/0x690 [ 845.776841] ? trace_hardirqs_on+0x2c0/0x2c0 [ 845.781261] ? kasan_check_write+0x14/0x20 [ 845.785507] block_ioctl+0xee/0x130 [ 845.789149] ? blkdev_fallocate+0x400/0x400 [ 845.793477] do_vfs_ioctl+0x1de/0x1720 [ 845.797377] ? ioctl_preallocate+0x300/0x300 [ 845.801791] ? __fget_light+0x2f7/0x440 [ 845.805773] ? __schedule+0x1df0/0x1df0 [ 845.809755] ? fget_raw+0x20/0x20 [ 845.813210] ? trace_hardirqs_off+0xb8/0x2b0 [ 845.817630] ? do_syscall_64+0x6be/0x820 [ 845.821696] ? trace_hardirqs_on+0x2c0/0x2c0 [ 845.826109] ? __x64_sys_futex+0x47f/0x6a0 [ 845.830347] ? do_syscall_64+0x9a/0x820 [ 845.834332] ? do_syscall_64+0x9a/0x820 [ 845.838313] ? lockdep_hardirqs_on+0x421/0x5c0 [ 845.842905] ? security_file_ioctl+0x94/0xc0 [ 845.847322] ksys_ioctl+0xa9/0xd0 [ 845.850784] __x64_sys_ioctl+0x73/0xb0 [ 845.854690] do_syscall_64+0x1b9/0x820 [ 845.858580] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 845.863953] ? syscall_return_slowpath+0x5e0/0x5e0 [ 845.868885] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 845.873908] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 845.878926] ? recalc_sigpending_tsk+0x180/0x180 [ 845.883686] ? kasan_check_write+0x14/0x20 [ 845.887927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.892786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.897973] RIP: 0033:0x457099 [ 845.901182] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 845.920108] RSP: 002b:00007fb51fa9bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 845.927824] RAX: ffffffffffffffda RBX: 00007fb51fa9c6d4 RCX: 0000000000457099 [ 845.935095] RDX: 0000000000000000 RSI: 000000000000ab01 RDI: 0000000000000003 [ 845.942363] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 845.949633] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 845.956902] R13: 00000000004cfa00 R14: 00000000004c5c46 R15: 0000000000000000 [ 845.964181] Modules linked in: [ 845.967375] Dumping ftrace buffer: [ 845.970910] (ftrace buffer empty) [ 845.974868] ---[ end trace 2d0fe61b00507336 ]--- [ 845.979685] RIP: 0010:nbd_ioctl+0x53c/0xcf0 [ 845.984064] Code: ea 03 80 3c 02 00 0f 85 1c 07 00 00 48 8b b5 c0 fe ff ff 48 63 8d b8 fe ff ff 48 8b 86 c8 00 00 00 48 8d be c0 00 00 00 48 99 <48> f7 f9 48 ba 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 80 3c [ 845.990956] hfs: can't find a HFS filesystem on dev loop6 [ 846.003011] RSP: 0018:ffff8801b942f828 EFLAGS: 00010246 [ 846.003025] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 846.003034] RDX: 0000000000000000 RSI: ffff8801d0f75280 RDI: ffff8801d0f75340 [ 846.003043] RBP: ffff8801b942f9a0 R08: ffff880189416500 R09: ffffed003a634b0d [ 846.003052] R10: ffff8801b942f818 R11: ffff8801d31a586f R12: ffff8801d31a5780 [ 846.003061] R13: 00000000ffffffe7 R14: ffff8801d31a5860 R15: ffff8801bbe52240 [ 846.003074] FS: 00007fb51fa9c700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 846.003083] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 846.003091] CR2: 0000000000726cec CR3: 00000001c587e000 CR4: 00000000001406e0 [ 846.003104] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 846.003112] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 846.003120] Kernel panic - not syncing: Fatal exception [ 846.003449] Dumping ftrace buffer: [ 846.003456] (ftrace buffer empty) [ 846.003460] Kernel Offset: disabled [ 846.102612] Rebooting in 86400 seconds..