Starting mcstransd: [ 39.030979] audit: type=1800 audit(1562217539.035:32): pid=7370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 39.780936] audit: type=1800 audit(1562217539.785:33): pid=7370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.80' (ECDSA) to the list of known hosts. 2019/07/04 05:19:07 fuzzer started syzkaller login: [ 47.887288] kauditd_printk_skb: 2 callbacks suppressed [ 47.887303] audit: type=1400 audit(1562217547.895:36): avc: denied { map } for pid=7554 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/07/04 05:19:11 dialing manager at 10.128.0.105:35861 2019/07/04 05:19:11 syscalls: 2460 2019/07/04 05:19:11 code coverage: enabled 2019/07/04 05:19:11 comparison tracing: enabled 2019/07/04 05:19:11 extra coverage: extra coverage is not supported by the kernel 2019/07/04 05:19:11 setuid sandbox: enabled 2019/07/04 05:19:11 namespace sandbox: enabled 2019/07/04 05:19:11 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/04 05:19:11 fault injection: enabled 2019/07/04 05:19:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/04 05:19:11 net packet injection: enabled 2019/07/04 05:19:11 net device setup: enabled 05:20:44 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0xb5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={r1, 0x80000000}, &(0x7f00000001c0)=0x8) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x9) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) ioperm(0x7c, 0x6789, 0x8367) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f00000002c0)=""/83, &(0x7f0000000340)=0x53) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000380)) r3 = getuid() ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f00000003c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r3}) sendmsg$nl_netfilter(r2, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)={0x108, 0xb, 0xf, 0x100, 0x70bd2d, 0x25dfdbfc, {0x7, 0x0, 0x7}, [@typed={0x18, 0x20, @str='/selinux/enforce\x00'}, @generic="0072ac320e1df6dfd8cdb45b46e08f11b22a69ad35b46e00be12b7cd0a61d8e4ab524cace41dc178ec0e81b5b4240cae41eeebb155a5c97a3d5fc0fc8b5c6d90cb73fa3c203337154da05afcda9fe8ab0a080d6f1e717f35c6f6d3879e436dcadca7fb62f15869b32dae89793b516006a0aef1ec8ace7eda159db5d9d351d58f775bb1f07ec258ebf83d8dfabb7017be6cf0cb10ee4b2f02f2", @nested={0xc, 0x69, [@typed={0x8, 0xe, @u32=0x2}]}, @typed={0x4, 0x49}, @generic="338f4f70ac440fbb9598dbb48545d460843f6c122c0db4dd1ea6932722a365f0fa02788463f99a", @typed={0xc, 0x4a, @u64=0x8000}]}, 0x108}, 0x1, 0x0, 0x0, 0x10}, 0x4040000) fcntl$addseals(r2, 0x409, 0x2) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm-monitor\x00', 0x2000, 0x0) r5 = add_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000006c0)={r5, 0x52, 0x6a}, &(0x7f0000000700)={'enc=', 'pkcs1', ' hash=', {'crc32\x00'}}, &(0x7f0000000780)="21c11be941fd612824defce06c2fb0689fcd4adcc3659fa21479a8ea7775abfcec264fedc3300ec23f3992bb0671b0e70da7b20aa441a7a08e82a9ec16bb49e73853c310bd16fc9597ae3600362c26af69fb", &(0x7f0000000800)=""/106) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000880)=0x23, 0x4) setsockopt$inet6_dccp_buf(r2, 0x21, 0xf, &(0x7f00000008c0)="07119446ccf0c77e59f0702190d65ae68a273a023fe26331f181644529e42888031350d7695e67df44a2aaf7593285190ce6c34d52001e991bc3a4d1fdbfdf355baff2eb3e", 0x45) ioctl$VIDIOC_G_OUTPUT(r4, 0x8004562e, &(0x7f0000000940)) ioctl$RTC_AIE_OFF(r4, 0x7002) r6 = semget$private(0x0, 0x7, 0x110) semctl$GETVAL(r6, 0x3, 0xc, &(0x7f0000000980)=""/52) fcntl$addseals(r2, 0x409, 0x8) sendfile(r2, r2, &(0x7f00000009c0), 0x7) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000a00)={0xc2, "fc4a46bd94f61a68f9728b26770dd7a787c4a3baf44e56899ade3e6442548842", 0x2, 0x1}) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000a40)='nv\x00', 0x3) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f0000000a80)={0xb3ff, "a4410d66230e5d2daea1044a50dd1bfae9e96b4850101f03653d70fd454fc4f8", 0x0, 0x7, 0x5, 0x0, 0x40820, 0x2}) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000b00)={0x3, @dev={[], 0x10}}) [ 144.984106] audit: type=1400 audit(1562217644.995:37): avc: denied { map } for pid=7572 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=89 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 145.068406] IPVS: ftp: loaded support on port[0] = 21 [ 145.165098] chnl_net:caif_netlink_parms(): no params data found 05:20:45 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8840, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x10001) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="90030e50712f538eb9f26df77e72b239afc4625cb4cb46a029f37e9fc6801d2f341279bca6f6252a8bf5b65e88f14bda2afb7d42a13ca14c6138a3aabd264ce9758e88b92b64759f2104a7acbd3af0046eb7f0d484868650e31d3405e3f983c3d49fe6be395d2bd04f066e3fdc46e52ab184ce7ab5896666634a601189d3b74258ac654b2a5986e4bf88238f87c5d551c2c4ac173e857f0898981e2ee2fcf8e2606ce06170500f8685673209ded6dd9b3c6ae3efacbc1f72a5811c91d5d21e514af734a1f510dfbaf1a83b76cc8258fcafbba0f1871732bd09a82f46fd9264") ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000140)) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x2c, &(0x7f00000001c0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x22}}, @in6={0xa, 0x4e22, 0x2716, @mcast1}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r1, 0x80000000, 0x3, [0x0, 0x1f, 0x9]}, &(0x7f00000002c0)=0xe) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r0, 0x8, 0x1, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000380)={r1, 0xffffffffffffffff}, &(0x7f00000003c0)=0x8) getsockopt(r0, 0xffffffffffffffde, 0x7, &(0x7f0000000400)=""/69, &(0x7f0000000480)=0x45) bind$rxrpc(r0, &(0x7f00000004c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x10000, @mcast1, 0x5}}, 0x24) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000500)={{0x2, @addr=0x7d}, 0x8, 0x6e, 0x7}) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000540)={[], 0x9, 0x8, 0x0, 0x0, 0x1f, 0x6000, 0x3000, [], 0xfff}) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000700)) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000740)=0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000780), 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000800)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00009fe000/0x600000)=nil, &(0x7f0000a93000/0x3000)=nil, &(0x7f0000c40000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000da9000/0x2000)=nil, &(0x7f0000ce3000/0x1000)=nil, &(0x7f0000e0c000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000007c0), 0x0, r0}, 0x68) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000880)=@assoc_value, &(0x7f00000008c0)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@local, @in6=@local}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000a00)=0xe8) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000a40)={0x6, "83dbdc3dd1a0def8e32c410504c01520da44f282f4ddd57dad5e3909ca16cb2c", 0x40, 0x900000000000, 0x7, 0x4, 0x7}) r2 = shmget$private(0x0, 0x3000, 0x100, &(0x7f0000bab000/0x3000)=nil) r3 = shmat(r2, &(0x7f0000bb7000/0x1000)=nil, 0x4000) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000c00)={'filter\x00', 0x0, 0x3, 0xca, [], 0x4, &(0x7f0000000ac0)=[{}, {}, {}, {}], &(0x7f0000000b00)=""/202}, &(0x7f0000000c80)=0x78) bind$unix(r0, &(0x7f0000000cc0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000d40)={0x93, "6667ab44793a9f7f17a58c22160eceef50a97022d4642c3bb6d37ae70cf69dd8", 0xaa0, 0x4, 0x3, 0x1, 0x1}) time(&(0x7f0000000dc0)) epoll_create(0x8) shmdt(r3) [ 145.211676] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.225781] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.234853] device bridge_slave_0 entered promiscuous mode [ 145.257594] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.264462] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.271737] device bridge_slave_1 entered promiscuous mode [ 145.308177] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 145.325207] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 145.343256] IPVS: ftp: loaded support on port[0] = 21 [ 145.362206] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 145.370615] team0: Port device team_slave_0 added [ 145.378005] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 145.385815] team0: Port device team_slave_1 added [ 145.391203] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 145.400456] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 05:20:45 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/tcp\x00') r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x101000, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000080)={0x2, r1}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x7, 0x10000) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@remote, 0xffffffffffffffff, 0x0, 0x3, 0x8, 0x80000000, 0x2}, &(0x7f00000001c0)=0x20) userfaultfd(0x80800) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x72, "11f733b869013c8b8c8c6b8b2d1b3113d74a94799d70a56b9d1a55ef3817985cb597c6eaa72d2f5fc78bb18e156604befe87d27cd17b6a2e45a7779dc78816a44415087c0b0fc6d9b20a8a1abe3212e288c3e58f700bc09898dc80d05780b0843c89c27c7665c04ec88cf3210da324027bc9"}, &(0x7f0000000280)=0x7a) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000002c0)={r4}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000340)=r5, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000380)={0xffffffffffffffe1, 0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000003c0)={0x2, r6, 0x10001, 0x7fff}) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {0x3, 0x4, 0x8}, 0x22, [0x9, 0x1, 0x6, 0xffffffff, 0x3, 0xe4, 0x3, 0x6, 0xfc9e, 0x4, 0x8, 0x4, 0x10001, 0x200, 0x80000001, 0x0, 0x0, 0x4, 0x6, 0x4, 0x8a, 0xb34, 0xfffffffffffffff8, 0x8, 0x5, 0x7, 0x7, 0x6000000000000, 0x80000000, 0xc6, 0x3, 0x8, 0x1, 0x8, 0x3, 0x8, 0x6, 0x69, 0xffff, 0x91d5, 0x54, 0x100000000, 0x51, 0x5, 0xa, 0xa4e, 0x1, 0x3f, 0x8995b17, 0x5, 0x9, 0x9, 0xff, 0x6, 0xb27, 0x0, 0x348, 0x100, 0x101, 0x100000001, 0x7, 0x7, 0x0, 0xc753], [0x7, 0x3, 0x1, 0x7f, 0x3, 0x0, 0x0, 0x6, 0x6, 0x8000, 0x5, 0x6, 0x9, 0x3ff, 0x2, 0x612, 0xaf, 0x3, 0x7ff, 0x100000001, 0x4, 0x0, 0xfffffffffffffff9, 0x10000, 0x800, 0x0, 0x1, 0x4, 0x7, 0x9, 0x4, 0x4, 0x100000001, 0x922b, 0x1, 0x6, 0x12000000, 0x5, 0x2, 0x800, 0x80000001, 0x20, 0x7, 0x7fffffff, 0x50, 0x4, 0x0, 0x2, 0x1, 0x5, 0x7, 0xb96, 0x7, 0x6, 0x9, 0x800, 0x9, 0x2f36f593, 0x2, 0x5, 0x2, 0x2b48, 0x2, 0x2], [0x5, 0x2, 0x2, 0x1, 0x3f, 0x8, 0x3ff, 0xfffffffffffffffc, 0x3, 0x0, 0xfffffffffffffffb, 0xffff, 0x7, 0x20, 0x2509, 0x1, 0x10001, 0x7, 0x1, 0xfffffffffffffff8, 0x4, 0x3ff, 0x6, 0xffff, 0xff, 0x3, 0xfffffffffffffffd, 0x401, 0xdb91, 0x81, 0x6, 0x6, 0x4, 0x1000, 0x6, 0x3, 0x8, 0xa0000, 0x86a4, 0x7, 0xb95c, 0x2, 0x6, 0x6, 0x100000001, 0x4, 0x2, 0xfff, 0xec4a, 0x57901e5a, 0xfc, 0x7, 0x0, 0x4, 0x8, 0x9, 0xffffffff, 0xfff, 0xff, 0x0, 0x4, 0x4, 0x101, 0xf5f], [0xc99, 0x80000001, 0x4, 0x5be8, 0x100000001, 0x9, 0x250, 0x5, 0x3, 0x7f, 0x9, 0x9, 0x3, 0x47, 0x2, 0x2f, 0x5, 0x100, 0x3, 0xffffffff00000001, 0x67, 0x0, 0x100000000, 0x9, 0x3e, 0x2, 0x6, 0xfff, 0x1000, 0x9, 0x6, 0x2, 0x8, 0x8, 0x10000, 0x0, 0x7, 0x4, 0x401, 0x3, 0x5, 0x4, 0x1, 0x8, 0x7f, 0x3, 0x2, 0x49f, 0x1, 0x5, 0xffffffff, 0x765c7e16, 0x3, 0x6ce, 0xfb, 0x4, 0x1, 0x4, 0x8, 0x3, 0x9, 0x33cd, 0x80000000, 0x8001]}, 0x45c) r7 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000880)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) acct(&(0x7f00000008c0)='./file0\x00') ioctl$NBD_SET_BLKSIZE(r7, 0xab01, 0x1bc) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000900)={'ipvs\x00'}, &(0x7f0000000940)=0x1e) bind$rds(r3, &(0x7f0000000980)={0x2, 0x4e20, @empty}, 0x10) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000009c0)=0xff) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000a00)={r5, 0x4b1d, 0x1, [0x673]}, &(0x7f0000000a40)=0xa) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000a80)={r5, 0xd61, 0x30}, 0xc) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000ac0)={r5, 0xfffffffffffffeff}, 0x8) write$binfmt_elf32(r2, &(0x7f0000000b00)={{0x7f, 0x45, 0x4c, 0x46, 0x400, 0x2, 0x7f, 0x6, 0x5, 0x3, 0x6, 0x3, 0x2f9, 0x38, 0x163, 0x3, 0x7fff, 0x20, 0x2, 0x5, 0x100000000}, [{0x60000000, 0x4, 0x5, 0x100, 0x1, 0x81, 0xfffffffffffffffb, 0x80}], "40a8776823d821db2ff6fdd0a5482667a39a38a30c194b370ffd6be9a10177cb0aadc8fe60b280d9073feb2e80dab4ce6255a06f9aca6f97b7e2dde82f8f16a7729a4f82d25d35c715398cbba89f7fc524554f6f8eba3a9bd1bfc7a7e687169ad17b68e9335b91b61d4ee8ea0dcdf968ddc65249a189c894f38004d99f50246784d7ac027f88", [[], [], [], []]}, 0x4de) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000001000)={0x18, 0x0, {0x3, @dev={[], 0x19}, 'hwsim0\x00'}}) ioctl$TCGETX(r7, 0x5432, &(0x7f0000001040)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000001080)='cubic\x00', 0x6) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000010c0)={'ip_vti0\x00', 0x8, 0xde37}) [ 145.486342] device hsr_slave_0 entered promiscuous mode [ 145.523752] device hsr_slave_1 entered promiscuous mode [ 145.564245] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 145.571320] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 145.589003] IPVS: ftp: loaded support on port[0] = 21 05:20:45 executing program 3: r0 = semget(0x0, 0x0, 0x4) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x101) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/178, 0xb2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7e}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r4, r6) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000500)) r7 = request_key(&(0x7f0000000580)='blacklist\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r6, r7) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa0, r8, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4740}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000004}, 0x804) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000800)={{0x4, 0x10000, 0x3, 0x100000001, 0x7, 0x3}, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0x100000000, "01ea80b6dadc2d065a5f1b1d1349523fbd286f8a5cd657d71b330a536dd29cba848b672815c0a8d4e65d707b251801a15c2d3abebca04886405ac9d2c609f8bc659d64c37af64af3761f82be5fc9bcae1b0c29e58d60507807d7ab8a330f43ee61e8cd9fa98fa02fea3d4b4577df6424b26eab72ca05988c8911ca6c9035349f"}) syz_mount_image$hfs(&(0x7f00000008c0)='hfs\x00', &(0x7f0000000900)='./file0\x00', 0xb4, 0x2, &(0x7f0000000a80)=[{&(0x7f0000000940)="3f91ea8071eb1f1ad1aa05bdcacc59d1155d648fa0115d9a3ba1b896efc20998410f7fc32e4c562af7fcd8f3738b78e58681f193540a51fd3e611348f39803f54f66ddd2169c1bdc69713b0edb4b1229a30adb78ed2192fd44a0a4cb6a01d6b669a5abe5ec72708eb5d89c149ec1d46504550dbbd16d0f3930a9ac", 0x7b, 0x7}, {&(0x7f00000009c0)="8723f895387c660c3596e4679376b604006eb1b129857a6e05bde83c17dec305d0ef0060f7ef0370a0a04277d458dd8a0ce7a3f4467b7521b9f5bd5ac60cddf9b39721b57c427ea6f74e505f99e0097c4249c68f625d37b62aa548adf67e92651530a9208c5b23d4e1bb98ab31635a4fdba94a4cdac173e11c4c08f242d83a076e9c77f9f287291177e3bbf2992b8e29bd0947adb5bfca", 0x97, 0x8}], 0x0, &(0x7f0000000ac0)={[{@creator={'creator', 0x3d, "379a76de"}}, {@creator={'creator', 0x3d, "3e354fd6"}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r6}}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000c40)={0x8, @win={{0xff, 0x8001, 0x1000, 0x2}, 0x3, 0x6, &(0x7f0000000b40)={{0x6, 0xfffffffffffffffb, 0x4}}, 0xea4, &(0x7f0000000b80)="c3107413e9234d2d0cab19e0f076b25218cbaf01aa4d0681ea9d9c7c08798c21fdf29743928997492099003018e002500bf3e638b3c2521671f7a8db7ce6b926baf280d19955c8f9370c78ce243cdfd31965fa99b6cb0a52e529d3141f93530eea16079108813bd68217c6e6ef20fa9861e9a515ad887cdad9b2a657065331516213967cb0e7f2ce25fec81b7eb8ee7935111e5840f3d994dec89e67f048634f7dc18c3afcaf79da03bffb", 0x10001}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000d80)={0x6, &(0x7f0000000d40)=[{0x10000, 0xfad, 0x67b3, 0x1}, {0x8, 0x8, 0x7, 0x100}, {0x4, 0x5, 0x7, 0x9}, {0x8e7, 0x1, 0x3, 0xfffffffffffffffc}, {0x4, 0x0, 0x650, 0xfffffffffffffffe}, {0x0, 0x80, 0x82, 0x101}]}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000dc0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1}) r9 = syz_open_dev$media(&(0x7f0000000e00)='/dev/media#\x00', 0x2ba, 0x111800) ptrace$setregs(0xf, r3, 0x6, &(0x7f0000000e40)="cf4271973379b334ff07c972188fd8fa57df411f8598a825fbfa3840c4747b90f61d7edc8bbe1cfa555d93f99e4ee85dd0913473aff15f4e0a82ed18283af2df2ae69f8e214d83ef815d99ff7227a0134f2e97de446005dca2f5b08df84d71306ebc932e6e4599336d388fb905024d1d487e24cf2223d767b33a90edd45a1ca4aa499f8fe5c96b7463e4fa") ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000f00)={"7a0eab4e78386387fc96ff4a955f6f8ce328d05b0bf13509c37b284f8df0b256fe69d11f29ca5b677e351da53019d0a2b25fcfe788769e9a9ef16f864095c030ed9463142085d3970af6809065377b551935cc39cc19a6bb65d89e492b64466134a78fa1802bc14275192b04ffc6ca38d6228ee3e4dde5b3693f0ef599ed26c1bcf3e9282ec251164d9754bce405cf139d3a5e2a469b4903a8b09fddaf4e6448aa002f566998a6144c3995e17f49a2e3d7be3ee87a5b04bf51357853d720d3c0ac95eed888051d5495a660dfbdca1c2bc1ab518d640a039b5bcdd536e196bdb550453ffefd962382e3ca16dd7eaa8015f01e40a3e6f73078a93a9a435a70eb5c3001fdfd0f97a3b17c8056762e262f086b2c74c81ba4b1377cf7f6bd344dc985d8f9aba2fc22340fe3bfa4a73a47bfe4d5e1ef2ad8058fbe35ca69de5fed918861f99b632b03cbd35ceeb59369677c829018e6e06f7fe0dcefc839048bb762bc8e76e21385bdeb92a7d92b84f850d553d197cd880ca5d6a824e37f5f72ec84ecb1da42f7405330084d73358f0a07ca4611e7f022cfba212eb6ee86d9e5215354df2db9714f17638425e962770213907393b8f6c4ce8a75bf0e3757595bab2cde3a07dfc9b7bccd9cf3cae8ac53deea46d83b6ee93067463cd92d4f85dab7035cef3527e2848288df261ae9d08b3f29b6539f2e9ccf8ecb9631d52a65e80098993e2b1020cecc97bf99f7be8ac5b80aebcf58a2104c3e2f82f5dd85321824d7bd01b89ea537d837e0a5c291292b6cdc838adb46c8ea7a46033106970b5a74d8acb930fe94d422a41fa4ff35dd4243e8799b22527fe48bb871db59e4367d263bf7903c665e18d306dd73ef12cf64fa4446e45fd2ee04bac7ae0dcf28b975aaa6d3bda2b7f653680d55de4189b078438e374b80c1ca6edeedcffabcfa7624ca38b7db74fb10a7a2522c25367fec1161766d89ac67868bf6d3c85cc3338ddc4975c51a235976f090cdead8393c562026e40301c8ebc3a79c7036dc02c0829a7a9fa639c2649dab817e94d42dea348aa9cba1974e606e7dcd853090c6f8991eef87d3b683f5973575a217cfc7b6a9af8ae46f577c138b7cd38be9f5124b95ab9878b781be302a166a92c52955bc43fd35509868534602af3a7393ad7bf873c0e8222dc9cada445e0dfd2ace48e416b6db8ac8cbf9d4e48b049a4e593f42904e2ea0187b991f6217883c34f132d0135dad2ea62305048202c90a83d569ad471c2e801c3f8f01ce1038c9aa6eb1776300348f7cb5adcc90fbe32642204720e89d0acbf030e7e4edce39b24abdb05063dda14cc8d0c1546b90887e41f45f3b0aa3741d05e36bbfec4476887aa288482bddb19d465de7ab661cc738f1cd5799ae43a41295de43c02b16d7a5bdaa1191ca8964c0b18d29e43357cdb034835b07cf55ddfdab"}) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000001300)={0x10001, 0x10001}) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001340)=""/191, &(0x7f0000001400)=0xbf) setsockopt$RDS_GET_MR_FOR_DEST(r9, 0x114, 0x7, &(0x7f0000001580)={@ll={0x11, 0xff, r5, 0x1, 0x5, 0x6, @remote}, {&(0x7f0000001440)=""/210, 0xd2}, &(0x7f0000001540), 0x1}, 0xa0) [ 145.633442] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.639965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.647024] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.653440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.776282] chnl_net:caif_netlink_parms(): no params data found [ 145.813169] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 145.834036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.850609] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 145.896039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.909171] IPVS: ftp: loaded support on port[0] = 21 [ 145.919388] bridge0: port 1(bridge_slave_0) entered disabled state 05:20:45 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x410000) r1 = accept4$ax25(r0, 0x0, &(0x7f0000000040), 0x80800) write$input_event(r0, &(0x7f0000000080)={{0x77359400}, 0x12, 0xffffffffffff97e8, 0x6}, 0x18) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000000c0)={0x59c0, 0x401, 0x6, {0x1, @sliced={0x5, [0x0, 0xfffffffffffffff7, 0x700000, 0xf183, 0x80, 0x652d1433, 0x62d4302f, 0x8, 0x0, 0x6, 0x200, 0x5, 0x1, 0xfffffffffffffff7, 0x6, 0xffffffff00000000, 0x8, 0x0, 0xffff, 0x0, 0x4, 0x7f, 0x4, 0x6174, 0x100000001, 0x8, 0x6d5, 0x100, 0x3, 0xfffffffffffffffb, 0x7, 0x0, 0x7, 0x8b08, 0x2, 0xffff, 0x2, 0x3, 0x10, 0x7, 0x5b76e4a1, 0x1, 0x0, 0xffffffffffffff7f, 0x1ff, 0x1, 0x7ff, 0xed87], 0x1}}}) ioctl$KDADDIO(r0, 0x4b34, 0x3) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futimesat(r0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={{r2, r3/1000+30000}, {r4, r5/1000+30000}}) r6 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x8, 0x80) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r6, 0x89e2, &(0x7f00000003c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r7}) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, &(0x7f0000000400)) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000440)={0x3, [0x2, 0x8001, 0x10000]}, 0xa) signalfd(r1, &(0x7f0000000480)={0xffff}, 0x8) r8 = syz_open_dev$swradio(&(0x7f00000004c0)='/dev/swradio#\x00', 0x1, 0x2) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) utimes(&(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={{r9, r10/1000+10000}}) mount$bpf(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x2000, &(0x7f0000000640)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x25ac}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xf65d}}, {@mode={'mode', 0x3d, 0x3}}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@euid_eq={'euid', 0x3d, r7}}, {@subj_user={'subj_user', 0x3d, '-em0'}}, {@context={'context', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', r7}}, {@euid_eq={'euid', 0x3d, r7}}, {@permit_directio='permit_directio'}]}) semget$private(0x0, 0x0, 0x400) getsockopt$bt_BT_CHANNEL_POLICY(r8, 0x112, 0xa, &(0x7f00000007c0)=0x4a6, &(0x7f0000000800)=0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000840)=@sack_info={0x0, 0x3, 0x6}, &(0x7f0000000880)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r8, 0x84, 0x6c, &(0x7f00000008c0)={0x0, 0xc7, "b03abae084088372e1652e493f5e3d94406494a4450031b56a5560a7b227c454a25bcec7e9d17f0464194ef6634e068d4ce98216b607888f94d690eaf76be5cf4333dbc6ea42caed19f869c2999dcd7cd70cdc4f4c2f333da275e07460644b5e9dc02c7579b96258da32130a2e11bd5bbb91c304bc2747aca519ff886df2df68d56d25627a1f482f291181616f7ac77116759fa24b0f965e6a5756b3b73e38f83c7500171daa5e0b31c95beefca0ae6c2195a736e1c905364f1ba4c95f482bf650c4752c24cbc7"}, &(0x7f00000009c0)=0xcf) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000a00)={r11, 0x4, 0x17d44dc2, 0xc82, 0xfffffffffffffffc, 0x2e34, 0x9, 0x7, {r12, @in6={{0xa, 0x4e20, 0x73, @mcast1, 0x4}}, 0x0, 0x5, 0x0, 0xffffffff, 0x3ff}}, &(0x7f0000000ac0)=0xb0) recvfrom$inet6(r8, &(0x7f0000000b00), 0x0, 0x10000, &(0x7f0000000b40)={0xa, 0x4e22, 0x1, @mcast1, 0x279}, 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000bc0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000b80)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r8, &(0x7f0000000c00)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xffff, @mcast1, 0x80}, {0xa, 0x4e22, 0x100000001, @local, 0xfffffffffffffbff}, r13, 0x7}}, 0x48) r14 = syz_open_dev$vcsa(&(0x7f0000000c80)='/dev/vcsa#\x00', 0x8, 0x40200) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f0000000d00)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000cc0), 0x111, 0x2}}, 0x20) open_by_handle_at(r0, &(0x7f0000000d40)={0xd, 0x9, "bcec83dd1b"}, 0x222800) ioctl$PPPIOCSACTIVE(r6, 0x40107446, &(0x7f0000000dc0)={0x3, &(0x7f0000000d80)=[{0x4, 0x100, 0x3, 0x6}, {0x0, 0x0, 0x1, 0x800}, {0x6, 0x7, 0x9, 0x7f432913}]}) [ 145.941289] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.949219] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 146.006741] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 146.012856] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.075995] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.082472] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.104541] device bridge_slave_0 entered promiscuous mode [ 146.111722] chnl_net:caif_netlink_parms(): no params data found [ 146.137177] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.144842] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.152144] device bridge_slave_1 entered promiscuous mode [ 146.169548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.180217] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.186672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.200351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 05:20:46 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)="411b993ed85872bed3dbbf81f7e76dc6875743ad8037b136c1dc158a23958bb4c128978f1b5144c1b6c3926dd2a58ad551236e1099285da2db8aa6d02b8e253bd4d0bdc1c547f4ed871cc9e57130b3a3f172d6e84fa878fd89b682ab3b8a1507c645fc30bd3eaddd8cb3bc90933317c6a61cad37d69da246"}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000100)=0x1, 0x4) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000140)={0x211, 0x6, 0x3f, 0x800, 0x8, 0xfffffffffffffff7}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip6gretap0\x00', 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x9d1) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000001c0)=0x1f) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = accept$nfc_llcp(r0, 0x0, &(0x7f0000000240)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/validatetrans\x00', 0x1, 0x0) exit_group(0x2) getxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.nlink\x00', &(0x7f0000000340)=""/219, 0xdb) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x4, 0x1, 0x1, 0x0, 0xbd}, 0xc) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f00000004c0)={0x0, 0x1, 0x4, &(0x7f0000000480)=0x2}) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) ppoll(&(0x7f0000000500)=[{r3, 0x80}, {r2, 0xc000}, {r1, 0x80}, {r3, 0x400}, {r2, 0x80}, {r1, 0x1}, {r1, 0x5000}], 0x7, &(0x7f0000000540)={0x77359400}, &(0x7f0000000580)={0xfffffffffffffe00}, 0x8) fremovexattr(r1, &(0x7f00000005c0)=@known='trusted.overlay.metacopy\x00') ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000600)=0x101) socket$alg(0x26, 0x5, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000640)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/kvm\x00', 0x4080, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000006c0)=""/19) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000700)=0x1) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000740)={[{0x7, 0x5, 0xe88, 0x200, 0x2, 0x1, 0xfff, 0xfffffffffffffffc, 0x2b51, 0x5, 0x3, 0xad, 0x800}, {0x5, 0x9e8e, 0x80000001, 0x7, 0x5, 0xef, 0x1, 0x2, 0x5, 0x7, 0x7, 0x7fffffff}, {0x7d, 0x2000, 0x6, 0x9, 0x3, 0x0, 0x1dc3, 0x0, 0x100000001, 0x200, 0x0, 0x7, 0x4}], 0x9}) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCAX25OPTRT(r4, 0x89e7, &(0x7f0000000800)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x2, 0x56}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000840)='/dev/kvm\x00', 0xc000, 0x0) msgget(0x0, 0x400) [ 146.229604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.245729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.255872] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.262257] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.282055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 146.282086] IPVS: ftp: loaded support on port[0] = 21 [ 146.297577] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 146.318479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.333604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 146.342877] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 146.352250] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 146.379162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.387517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.389534] IPVS: ftp: loaded support on port[0] = 21 [ 146.397989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.408162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.426487] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 146.434682] team0: Port device team_slave_0 added [ 146.439944] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.446476] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.453734] device bridge_slave_0 entered promiscuous mode [ 146.468383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 146.477424] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 146.484670] team0: Port device team_slave_1 added [ 146.490081] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 146.497511] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.504859] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.511859] device bridge_slave_1 entered promiscuous mode [ 146.524437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.532131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.546462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 146.553733] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 146.572223] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 146.581657] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 146.599239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.606972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.620763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 146.706426] device hsr_slave_0 entered promiscuous mode [ 146.763837] device hsr_slave_1 entered promiscuous mode [ 146.817606] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 146.824686] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 146.831832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.839468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.850257] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 146.857453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.864781] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 146.872912] team0: Port device team_slave_0 added [ 146.921082] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 146.930096] team0: Port device team_slave_1 added [ 146.938444] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 146.966928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 146.994921] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 147.010858] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 147.046091] device hsr_slave_0 entered promiscuous mode [ 147.084038] device hsr_slave_1 entered promiscuous mode [ 147.130672] chnl_net:caif_netlink_parms(): no params data found [ 147.174531] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 147.188949] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 147.200760] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.215557] chnl_net:caif_netlink_parms(): no params data found [ 147.240551] audit: type=1400 audit(1562217647.245:38): avc: denied { associate } for pid=7573 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 147.251923] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 147.291346] chnl_net:caif_netlink_parms(): no params data found 05:20:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x40000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x90}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x68, r3, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xf44f, @media='eth\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000011}, 0x40) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000002c0)={0x800000000000000b, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 147.390268] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.422414] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.432148] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.444529] device bridge_slave_0 entered promiscuous mode [ 147.451573] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.458639] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.465899] device bridge_slave_1 entered promiscuous mode [ 147.493214] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 147.503355] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 147.511158] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.518989] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.525654] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.532631] device bridge_slave_0 entered promiscuous mode [ 147.551394] audit: type=1400 audit(1562217647.555:39): avc: denied { create } for pid=7599 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 147.560621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.582311] audit: type=1400 audit(1562217647.555:40): avc: denied { write } for pid=7599 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 147.606704] audit: type=1400 audit(1562217647.555:41): avc: denied { read } for pid=7599 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 147.606907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.638470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.647730] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.656677] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.664223] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.671224] device bridge_slave_1 entered promiscuous mode [ 147.683947] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.691344] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.698833] device bridge_slave_0 entered promiscuous mode [ 147.707932] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 147.714371] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.740207] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.749111] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.756068] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.763057] device bridge_slave_1 entered promiscuous mode [ 147.776798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 147.788680] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 147.796364] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.821302] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 147.828919] team0: Port device team_slave_0 added [ 147.834751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.842689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.850410] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.856956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.866476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 147.875281] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 147.882765] team0: Port device team_slave_0 added [ 147.894704] bond0: Enslaving bond_slave_0 as an active interface with an up link 05:20:47 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x2410005, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) ioctl(r1, 0x8, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e23, 0x4, @mcast2, 0x8}, {0xa, 0x4e23, 0x401, @empty, 0x3c8}, 0x0, [0x1000, 0x3, 0x9, 0xfffffffffffffff9, 0x7, 0x6, 0xd1, 0x3]}, 0x5c) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') [ 147.902613] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 147.916960] team0: Port device team_slave_1 added [ 147.922273] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 147.930482] team0: Port device team_slave_1 added [ 147.938196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:20:48 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x80000000000, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x824, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0x8cffffff}}]}) [ 147.947595] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.959148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.967525] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.973991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.983927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 147.992998] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 148.012125] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 148.019866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 148.042016] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 148.056528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 148.068006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.079128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.087637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.104256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.113636] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 148.121258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.129270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.143607] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 148.150977] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 05:20:48 executing program 0: msgget$private(0x0, 0x264) msgget(0x1, 0x20) socket$inet(0x2, 0x800, 0x7) syz_init_net_socket$ax25(0x3, 0x0, 0xf6) msgget$private(0x0, 0x4) msgget(0x3, 0x200) msgget(0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) [ 148.164025] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 148.170105] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.189559] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.212562] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 148.235465] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 148.245835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.256508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.264862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.272854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.280935] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.287384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.302387] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 148.312279] team0: Port device team_slave_0 added [ 148.325473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 05:20:48 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x5) setresuid(0x0, 0xee01, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x440080, 0x0) fcntl$setstatus(r0, 0x4, 0x0) setfsuid(0x0) [ 148.334658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 148.341661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.352343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.361604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.374781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 05:20:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x80003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'irlan0\x00', {0x2, 0x0, @remote}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000380), &(0x7f00000003c0)=0x4) tkill(r1, 0x1b) [ 148.382691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.393755] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.400237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.445805] device hsr_slave_0 entered promiscuous mode [ 148.484592] device hsr_slave_1 entered promiscuous mode [ 148.534529] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 148.575350] device hsr_slave_0 entered promiscuous mode [ 148.613900] device hsr_slave_1 entered promiscuous mode [ 148.673978] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 148.681315] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 148.688898] team0: Port device team_slave_1 added [ 148.694891] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 148.703003] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 148.718630] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 148.729156] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 148.738367] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 148.748705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 148.776336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.784220] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.791772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.801843] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 148.808187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.866420] device hsr_slave_0 entered promiscuous mode [ 148.923892] device hsr_slave_1 entered promiscuous mode [ 148.967050] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 148.976918] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 148.988154] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 148.996208] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 149.004936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.017032] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 149.026580] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 149.035653] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 149.051918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.060408] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.068192] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.082068] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.090456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 149.098670] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 149.111964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.119851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.129854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 149.142947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 149.153762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.161299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.171313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.180711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.195810] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 149.201902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 05:20:49 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) move_pages(0x0, 0x1e8, &(0x7f0000000140)=[&(0x7f0000ff9000/0x4000)=nil], 0x0, &(0x7f0000000080), 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) [ 149.280508] hugetlbfs: Bad mount option: "òÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿÿòÿÿ [ 149.292995] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 05:20:49 executing program 1: [ 149.409071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.435201] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 149.444278] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.454825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.470494] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.485608] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 149.492322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.500539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.521032] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 149.532658] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 149.542623] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 149.549293] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.561954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 149.579875] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 149.588345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.601363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.610659] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.617121] bridge0: port 1(bridge_slave_0) entered forwarding state 05:20:49 executing program 2: [ 149.624419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.631532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.646112] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 149.653134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 149.663700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.672438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.680479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.688036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.697322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.706529] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.712929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.723898] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 149.732322] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 149.739207] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.749728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.761598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 149.778541] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 149.785742] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.792016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.803134] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 149.811705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 149.821821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 149.831981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 149.841776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.849897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.857717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.865493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.873067] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.879456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.886710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.894758] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.902337] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.908729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.915772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.924052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.931609] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.938004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.947144] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 149.956098] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.963151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.970405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.977664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.985922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.996400] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 150.004999] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 150.012934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 150.020520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.028146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.036500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.044373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.051900] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.058280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.065336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.077581] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 150.087213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 150.096186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.104255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.111708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.120675] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 150.132590] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 150.140073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.147906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.157006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.166100] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 150.172179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.182198] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.192148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 150.205125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 150.215032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.222860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.230785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.242039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 150.254077] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 150.261133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.269375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.278081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.285763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.293501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.301774] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 150.311330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 150.318731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.326972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.335009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.342486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.352441] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 150.361479] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 150.368155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.376447] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 150.384768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.392306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.408187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 150.420089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.427682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.440963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.450773] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 150.461887] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.471064] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 150.477786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.516046] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 150.532414] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.660081] hfs: unable to parse mount options [ 150.729197] hfs: unable to parse mount options 05:20:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{}]}) 05:20:50 executing program 1: 05:20:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x200001fd, &(0x7f00000003c0)=@raw=[@call, @map, @jmp, @initr0, @alu, @exit, @exit, @map], &(0x7f0000000580)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0xc3, &(0x7f0000000240)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x70) 05:20:50 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'btrfs.', 'tmpfs\x00'}, 0x0, 0x0, 0x0) 05:20:50 executing program 4: mknod(&(0x7f0000000140)='./bus\x00', 0xa88, 0x0) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) 05:20:50 executing program 1: mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x200000003, &(0x7f0000130000/0x800000)=nil) 05:20:50 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:20:50 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@dmode={'dmode'}}]}) [ 151.072028] ISOFS: Unable to identify CD-ROM format. [ 151.159464] ISOFS: Unable to identify CD-ROM format. 05:20:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x80003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'irlan0\x00', {0x2, 0x0, @remote}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000380), &(0x7f00000003c0)=0x4) tkill(r1, 0x1b) 05:20:51 executing program 2: syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@commit={'commit'}}]}) 05:20:51 executing program 3: r0 = semget(0x0, 0x0, 0x4) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x101) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/178, 0xb2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7e}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r4, r6) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000500)) r7 = request_key(&(0x7f0000000580)='blacklist\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r6, r7) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa0, r8, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4740}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000004}, 0x804) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000800)={{0x4, 0x10000, 0x3, 0x100000001, 0x7, 0x3}, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0x100000000, "01ea80b6dadc2d065a5f1b1d1349523fbd286f8a5cd657d71b330a536dd29cba848b672815c0a8d4e65d707b251801a15c2d3abebca04886405ac9d2c609f8bc659d64c37af64af3761f82be5fc9bcae1b0c29e58d60507807d7ab8a330f43ee61e8cd9fa98fa02fea3d4b4577df6424b26eab72ca05988c8911ca6c9035349f"}) syz_mount_image$hfs(&(0x7f00000008c0)='hfs\x00', &(0x7f0000000900)='./file0\x00', 0xb4, 0x2, &(0x7f0000000a80)=[{&(0x7f0000000940)="3f91ea8071eb1f1ad1aa05bdcacc59d1155d648fa0115d9a3ba1b896efc20998410f7fc32e4c562af7fcd8f3738b78e58681f193540a51fd3e611348f39803f54f66ddd2169c1bdc69713b0edb4b1229a30adb78ed2192fd44a0a4cb6a01d6b669a5abe5ec72708eb5d89c149ec1d46504550dbbd16d0f3930a9ac", 0x7b, 0x7}, {&(0x7f00000009c0)="8723f895387c660c3596e4679376b604006eb1b129857a6e05bde83c17dec305d0ef0060f7ef0370a0a04277d458dd8a0ce7a3f4467b7521b9f5bd5ac60cddf9b39721b57c427ea6f74e505f99e0097c4249c68f625d37b62aa548adf67e92651530a9208c5b23d4e1bb98ab31635a4fdba94a4cdac173e11c4c08f242d83a076e9c77f9f287291177e3bbf2992b8e29bd0947adb5bfca", 0x97, 0x8}], 0x0, &(0x7f0000000ac0)={[{@creator={'creator', 0x3d, "379a76de"}}, {@creator={'creator', 0x3d, "3e354fd6"}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r6}}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000c40)={0x8, @win={{0xff, 0x8001, 0x1000, 0x2}, 0x3, 0x6, &(0x7f0000000b40)={{0x6, 0xfffffffffffffffb, 0x4}}, 0xea4, &(0x7f0000000b80)="c3107413e9234d2d0cab19e0f076b25218cbaf01aa4d0681ea9d9c7c08798c21fdf29743928997492099003018e002500bf3e638b3c2521671f7a8db7ce6b926baf280d19955c8f9370c78ce243cdfd31965fa99b6cb0a52e529d3141f93530eea16079108813bd68217c6e6ef20fa9861e9a515ad887cdad9b2a657065331516213967cb0e7f2ce25fec81b7eb8ee7935111e5840f3d994dec89e67f048634f7dc18c3afcaf79da03bffb", 0x10001}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000d80)={0x6, &(0x7f0000000d40)=[{0x10000, 0xfad, 0x67b3, 0x1}, {0x8, 0x8, 0x7, 0x100}, {0x4, 0x5, 0x7, 0x9}, {0x8e7, 0x1, 0x3, 0xfffffffffffffffc}, {0x4, 0x0, 0x650, 0xfffffffffffffffe}, {0x0, 0x80, 0x82, 0x101}]}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000dc0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1}) r9 = syz_open_dev$media(&(0x7f0000000e00)='/dev/media#\x00', 0x2ba, 0x111800) ptrace$setregs(0xf, r3, 0x6, &(0x7f0000000e40)="cf4271973379b334ff07c972188fd8fa57df411f8598a825fbfa3840c4747b90f61d7edc8bbe1cfa555d93f99e4ee85dd0913473aff15f4e0a82ed18283af2df2ae69f8e214d83ef815d99ff7227a0134f2e97de446005dca2f5b08df84d71306ebc932e6e4599336d388fb905024d1d487e24cf2223d767b33a90edd45a1ca4aa499f8fe5c96b7463e4fa") ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000f00)={"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"}) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000001300)={0x10001, 0x10001}) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001340)=""/191, &(0x7f0000001400)=0xbf) setsockopt$RDS_GET_MR_FOR_DEST(r9, 0x114, 0x7, &(0x7f0000001580)={@ll={0x11, 0xff, r5, 0x1, 0x5, 0x6, @remote}, {&(0x7f0000001440)=""/210, 0xd2}, &(0x7f0000001540), 0x1}, 0xa0) 05:20:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz0\x00', 0x21}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2c01, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 05:20:51 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1b) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x1) close(r1) r3 = accept4(r2, 0x0, 0x0, 0x80800) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0x80b0) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10011820}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="220190bd7000fcdbdf25090000000800040007000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040001) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) recvmmsg(r1, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x400400, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000300)={0x8a, 0x55e}) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCMBIC(r6, 0x5417, &(0x7f0000000200)=0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) setfsuid(r7) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000280)=0x100000001, 0x4) 05:20:51 executing program 5: unshare(0x8000000) r0 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x1, 0x0) mq_timedreceive(r0, &(0x7f0000000380)=""/204, 0xfffffffffffffec9, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000080)={0x80, 0x654}) [ 151.482329] input: syz0 as /devices/virtual/input/input5 [ 151.509185] hfs: unable to parse mount options [ 151.514714] hrtimer: interrupt took 31710 ns 05:20:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x3) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet6(0xa, 0x3, 0x3a) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pread64(0xffffffffffffffff, 0x0, 0xe1, 0x0) sched_yield() recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x4000, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) get_thread_area(0x0) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x79}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e24, 0x0, @local, 0x281}, {0xa, 0x0, 0x82d, @mcast1}, 0x7, [0x1, 0x0, 0xbc6, 0x4, 0x9, 0x0, 0x0, 0xffffffffffffffff]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, 0x0, 0xa1) 05:20:51 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r3, 0x0, &(0x7f0000000140)={0x3c, 0x7}) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x40, &(0x7f0000000100)={0x2, 0x10004e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xfffffdb1) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x75c3, 0x0, 0xd2d8bf77a6bc85e7) [ 151.549282] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "" 05:20:51 executing program 3: r0 = semget(0x0, 0x0, 0x4) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x101) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/178, 0xb2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7e}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r4, r6) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000500)) r7 = request_key(&(0x7f0000000580)='blacklist\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r6, r7) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa0, r8, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4740}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000004}, 0x804) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000800)={{0x4, 0x10000, 0x3, 0x100000001, 0x7, 0x3}, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0x100000000, "01ea80b6dadc2d065a5f1b1d1349523fbd286f8a5cd657d71b330a536dd29cba848b672815c0a8d4e65d707b251801a15c2d3abebca04886405ac9d2c609f8bc659d64c37af64af3761f82be5fc9bcae1b0c29e58d60507807d7ab8a330f43ee61e8cd9fa98fa02fea3d4b4577df6424b26eab72ca05988c8911ca6c9035349f"}) syz_mount_image$hfs(&(0x7f00000008c0)='hfs\x00', &(0x7f0000000900)='./file0\x00', 0xb4, 0x2, &(0x7f0000000a80)=[{&(0x7f0000000940)="3f91ea8071eb1f1ad1aa05bdcacc59d1155d648fa0115d9a3ba1b896efc20998410f7fc32e4c562af7fcd8f3738b78e58681f193540a51fd3e611348f39803f54f66ddd2169c1bdc69713b0edb4b1229a30adb78ed2192fd44a0a4cb6a01d6b669a5abe5ec72708eb5d89c149ec1d46504550dbbd16d0f3930a9ac", 0x7b, 0x7}, {&(0x7f00000009c0)="8723f895387c660c3596e4679376b604006eb1b129857a6e05bde83c17dec305d0ef0060f7ef0370a0a04277d458dd8a0ce7a3f4467b7521b9f5bd5ac60cddf9b39721b57c427ea6f74e505f99e0097c4249c68f625d37b62aa548adf67e92651530a9208c5b23d4e1bb98ab31635a4fdba94a4cdac173e11c4c08f242d83a076e9c77f9f287291177e3bbf2992b8e29bd0947adb5bfca", 0x97, 0x8}], 0x0, &(0x7f0000000ac0)={[{@creator={'creator', 0x3d, "379a76de"}}, {@creator={'creator', 0x3d, "3e354fd6"}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r6}}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000c40)={0x8, @win={{0xff, 0x8001, 0x1000, 0x2}, 0x3, 0x6, &(0x7f0000000b40)={{0x6, 0xfffffffffffffffb, 0x4}}, 0xea4, &(0x7f0000000b80)="c3107413e9234d2d0cab19e0f076b25218cbaf01aa4d0681ea9d9c7c08798c21fdf29743928997492099003018e002500bf3e638b3c2521671f7a8db7ce6b926baf280d19955c8f9370c78ce243cdfd31965fa99b6cb0a52e529d3141f93530eea16079108813bd68217c6e6ef20fa9861e9a515ad887cdad9b2a657065331516213967cb0e7f2ce25fec81b7eb8ee7935111e5840f3d994dec89e67f048634f7dc18c3afcaf79da03bffb", 0x10001}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000d80)={0x6, &(0x7f0000000d40)=[{0x10000, 0xfad, 0x67b3, 0x1}, {0x8, 0x8, 0x7, 0x100}, {0x4, 0x5, 0x7, 0x9}, {0x8e7, 0x1, 0x3, 0xfffffffffffffffc}, {0x4, 0x0, 0x650, 0xfffffffffffffffe}, {0x0, 0x80, 0x82, 0x101}]}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000dc0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1}) r9 = syz_open_dev$media(&(0x7f0000000e00)='/dev/media#\x00', 0x2ba, 0x111800) ptrace$setregs(0xf, r3, 0x6, &(0x7f0000000e40)="cf4271973379b334ff07c972188fd8fa57df411f8598a825fbfa3840c4747b90f61d7edc8bbe1cfa555d93f99e4ee85dd0913473aff15f4e0a82ed18283af2df2ae69f8e214d83ef815d99ff7227a0134f2e97de446005dca2f5b08df84d71306ebc932e6e4599336d388fb905024d1d487e24cf2223d767b33a90edd45a1ca4aa499f8fe5c96b7463e4fa") ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000f00)={"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"}) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000001300)={0x10001, 0x10001}) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001340)=""/191, &(0x7f0000001400)=0xbf) setsockopt$RDS_GET_MR_FOR_DEST(r9, 0x114, 0x7, &(0x7f0000001580)={@ll={0x11, 0xff, r5, 0x1, 0x5, 0x6, @remote}, {&(0x7f0000001440)=""/210, 0xd2}, &(0x7f0000001540), 0x1}, 0xa0) 05:20:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x80003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'irlan0\x00', {0x2, 0x0, @remote}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000380), &(0x7f00000003c0)=0x4) tkill(r1, 0x1b) 05:20:51 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000140)={0x4, &(0x7f0000000040)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000180)={r2, 0x2}) r3 = syz_open_dev$mice(0x0, 0x0, 0x1) r4 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r4, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="6b293b9ae5b254ed19ff3ca6a9558f79230a2bf4034ea8c740a021728970a36c6a0a78a5feca0567397c9d770d74e502d4a9d94dffaf3039bd", @ANYRES16=r5, @ANYBLOB="100f2dbd7000fcdbdf25110000004c000900080001000900000008000100f9ffffff080001000800000008000200fd71000008000100000000000800020004000000080001000900000008000100be0000000800010001000100"], 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x20000054) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) openat$cgroup_subtree(r3, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) [ 151.727133] input: syz0 as /devices/virtual/input/input6 [ 151.751377] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "" 05:20:51 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x11, 0x7f, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x3}, 0x1000002a4) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000140)={r0, &(0x7f00000002c0)="56fc", 0x0}, 0x18) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x50440) [ 151.827067] hfs: unable to parse mount options 05:20:51 executing program 1: r0 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x4240) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f00000003c0)) r1 = syz_open_dev$midi(0x0, 0x0, 0x10000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) getgroups(0x1, &(0x7f0000000580)=[0xee00]) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)=0x7) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) connect$x25(r1, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x1, 0x1) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0xf5, 0x2}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000340)=0x80000001, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 05:20:51 executing program 2: syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x4cb26304, 0x2) socket$nl_generic(0x10, 0x3, 0x10) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000100)=@ng={0x4, 0x6, "b59a67c6e2b5da948419b26b2531fb687bd73d0f"}, 0x16, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") pselect6(0x40, &(0x7f00000000c0)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 05:20:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\xff', 0x1ff) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000180), 0x8) socket$inet_dccp(0x2, 0x6, 0x0) mount$fuse(0x20000000, &(0x7f0000000280)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) fcntl$dupfd(r0, 0x406, r3) write$cgroup_pid(r3, &(0x7f00000000c0), 0x7) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000001c0)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x6a, 0x0, 0x2, 0x7f, 0x1ff, 0x9, 0xffffffff, 0x134c, 0x0, 0xfff, 0x0, 0x0, 0x0, 0xc5, 0x9, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffe01, 0x0, 0x7, 0xd5, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x7, 0x0, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x630, 0x20, 0x400, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x73, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x6, 0xffffffffffffff9a, 0x0, 0x80000001, 0x7, 0xffffffffffffff33, 0xff, 0xffff, 0x3f, 0x0, 0xbd4, 0x7, 0x0, 0x0, 0x0, 0x3ff, 0xa91, 0x8, 0x8, 0x0, 0x0, 0x7, 0x7fff, 0x10001, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xfffffffffffffc00, 0x0, 0xfff, 0x0, 0x9, 0x6e6a], [0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6d, 0x7, 0x8, 0x0, 0x0, 0x16, 0x42, 0x0, 0x7, 0x9, 0x0, 0x3, 0x6, 0x100, 0x2, 0x100000001, 0x800, 0xfffffffffffffffe, 0x8d, 0x8, 0x10001, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x7, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x40, 0x0, 0x6, 0x9, 0x2, 0x0, 0x3, 0x3], [0x7e700000000, 0x0, 0x80000001, 0xa7c, 0x0, 0x0, 0x2, 0x0, 0x2, 0x7, 0x4, 0x20, 0x23, 0x80, 0x8, 0x2, 0x400, 0x0, 0x3, 0xfffffffffffff134, 0x9, 0x98, 0x20, 0x7f, 0x8, 0x3, 0x6, 0x1, 0xff, 0x400, 0x3, 0x20, 0x3, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x8001]}, 0x45c) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) [ 151.917611] audit: type=1400 audit(1562217651.925:42): avc: denied { map_create } for pid=7778 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:20:52 executing program 3: r0 = semget(0x0, 0x0, 0x4) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x101) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/178, 0xb2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7e}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r4, r6) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000500)) r7 = request_key(&(0x7f0000000580)='blacklist\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r6, r7) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa0, r8, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4740}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000004}, 0x804) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000800)={{0x4, 0x10000, 0x3, 0x100000001, 0x7, 0x3}, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0x100000000, "01ea80b6dadc2d065a5f1b1d1349523fbd286f8a5cd657d71b330a536dd29cba848b672815c0a8d4e65d707b251801a15c2d3abebca04886405ac9d2c609f8bc659d64c37af64af3761f82be5fc9bcae1b0c29e58d60507807d7ab8a330f43ee61e8cd9fa98fa02fea3d4b4577df6424b26eab72ca05988c8911ca6c9035349f"}) syz_mount_image$hfs(&(0x7f00000008c0)='hfs\x00', &(0x7f0000000900)='./file0\x00', 0xb4, 0x2, &(0x7f0000000a80)=[{&(0x7f0000000940)="3f91ea8071eb1f1ad1aa05bdcacc59d1155d648fa0115d9a3ba1b896efc20998410f7fc32e4c562af7fcd8f3738b78e58681f193540a51fd3e611348f39803f54f66ddd2169c1bdc69713b0edb4b1229a30adb78ed2192fd44a0a4cb6a01d6b669a5abe5ec72708eb5d89c149ec1d46504550dbbd16d0f3930a9ac", 0x7b, 0x7}, {&(0x7f00000009c0)="8723f895387c660c3596e4679376b604006eb1b129857a6e05bde83c17dec305d0ef0060f7ef0370a0a04277d458dd8a0ce7a3f4467b7521b9f5bd5ac60cddf9b39721b57c427ea6f74e505f99e0097c4249c68f625d37b62aa548adf67e92651530a9208c5b23d4e1bb98ab31635a4fdba94a4cdac173e11c4c08f242d83a076e9c77f9f287291177e3bbf2992b8e29bd0947adb5bfca", 0x97, 0x8}], 0x0, &(0x7f0000000ac0)={[{@creator={'creator', 0x3d, "379a76de"}}, {@creator={'creator', 0x3d, "3e354fd6"}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r6}}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000c40)={0x8, @win={{0xff, 0x8001, 0x1000, 0x2}, 0x3, 0x6, &(0x7f0000000b40)={{0x6, 0xfffffffffffffffb, 0x4}}, 0xea4, &(0x7f0000000b80)="c3107413e9234d2d0cab19e0f076b25218cbaf01aa4d0681ea9d9c7c08798c21fdf29743928997492099003018e002500bf3e638b3c2521671f7a8db7ce6b926baf280d19955c8f9370c78ce243cdfd31965fa99b6cb0a52e529d3141f93530eea16079108813bd68217c6e6ef20fa9861e9a515ad887cdad9b2a657065331516213967cb0e7f2ce25fec81b7eb8ee7935111e5840f3d994dec89e67f048634f7dc18c3afcaf79da03bffb", 0x10001}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000d80)={0x6, &(0x7f0000000d40)=[{0x10000, 0xfad, 0x67b3, 0x1}, {0x8, 0x8, 0x7, 0x100}, {0x4, 0x5, 0x7, 0x9}, {0x8e7, 0x1, 0x3, 0xfffffffffffffffc}, {0x4, 0x0, 0x650, 0xfffffffffffffffe}, {0x0, 0x80, 0x82, 0x101}]}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000dc0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1}) r9 = syz_open_dev$media(&(0x7f0000000e00)='/dev/media#\x00', 0x2ba, 0x111800) ptrace$setregs(0xf, r3, 0x6, &(0x7f0000000e40)="cf4271973379b334ff07c972188fd8fa57df411f8598a825fbfa3840c4747b90f61d7edc8bbe1cfa555d93f99e4ee85dd0913473aff15f4e0a82ed18283af2df2ae69f8e214d83ef815d99ff7227a0134f2e97de446005dca2f5b08df84d71306ebc932e6e4599336d388fb905024d1d487e24cf2223d767b33a90edd45a1ca4aa499f8fe5c96b7463e4fa") ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000f00)={"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"}) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000001300)={0x10001, 0x10001}) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001340)=""/191, &(0x7f0000001400)=0xbf) setsockopt$RDS_GET_MR_FOR_DEST(r9, 0x114, 0x7, &(0x7f0000001580)={@ll={0x11, 0xff, r5, 0x1, 0x5, 0x6, @remote}, {&(0x7f0000001440)=""/210, 0xd2}, &(0x7f0000001540), 0x1}, 0xa0) 05:20:52 executing program 1: r0 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x4240) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f00000003c0)) r1 = syz_open_dev$midi(0x0, 0x0, 0x10000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) getgroups(0x1, &(0x7f0000000580)=[0xee00]) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)=0x7) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) connect$x25(r1, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x1, 0x1) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0xf5, 0x2}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000340)=0x80000001, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) [ 152.185733] hfs: unable to parse mount options 05:20:52 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f0000000300)={0x2, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e21, @local}}}, 0x108) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r2, 0x308, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004010}, 0x4044080) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f00000001c0)=""/196, &(0x7f00000002c0)=0xc4) sendmsg$rds(r0, &(0x7f0000002ac0)={&(0x7f0000000000)={0xa, 0x0, @empty}, 0x20000010, 0x0}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xa0, r3, 0x524, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5d}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) 05:20:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\xff', 0x1ff) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000180), 0x8) socket$inet_dccp(0x2, 0x6, 0x0) mount$fuse(0x20000000, &(0x7f0000000280)='./file0\x00', 0x0, 0x7a04, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) fcntl$dupfd(r0, 0x406, r3) write$cgroup_pid(r3, &(0x7f00000000c0), 0x7) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000001c0)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x6a, 0x0, 0x2, 0x7f, 0x1ff, 0x9, 0xffffffff, 0x134c, 0x0, 0xfff, 0x0, 0x0, 0x0, 0xc5, 0x9, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffe01, 0x0, 0x7, 0xd5, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x7, 0x0, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x630, 0x20, 0x400, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x73, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x6, 0xffffffffffffff9a, 0x0, 0x80000001, 0x7, 0xffffffffffffff33, 0xff, 0xffff, 0x3f, 0x0, 0xbd4, 0x7, 0x0, 0x0, 0x0, 0x3ff, 0xa91, 0x8, 0x8, 0x0, 0x0, 0x7, 0x7fff, 0x10001, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xfffffffffffffc00, 0x0, 0xfff, 0x0, 0x9, 0x6e6a], [0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6d, 0x7, 0x8, 0x0, 0x0, 0x16, 0x42, 0x0, 0x7, 0x9, 0x0, 0x3, 0x6, 0x100, 0x2, 0x100000001, 0x800, 0xfffffffffffffffe, 0x8d, 0x8, 0x10001, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x7, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x40, 0x0, 0x6, 0x9, 0x2, 0x0, 0x3, 0x3], [0x7e700000000, 0x0, 0x80000001, 0xa7c, 0x0, 0x0, 0x2, 0x0, 0x2, 0x7, 0x4, 0x20, 0x23, 0x80, 0x8, 0x2, 0x400, 0x0, 0x3, 0xfffffffffffff134, 0x9, 0x98, 0x20, 0x7f, 0x8, 0x3, 0x6, 0x1, 0xff, 0x400, 0x3, 0x20, 0x3, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x8001]}, 0x45c) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 05:20:52 executing program 3: r0 = semget(0x0, 0x0, 0x4) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x101) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/178, 0xb2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7e}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r4, r5) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000500)) r6 = request_key(&(0x7f0000000580)='blacklist\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r5, r6) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa0, r7, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4740}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000004}, 0x804) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000800)={{0x4, 0x10000, 0x3, 0x100000001, 0x7, 0x3}, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0x100000000, "01ea80b6dadc2d065a5f1b1d1349523fbd286f8a5cd657d71b330a536dd29cba848b672815c0a8d4e65d707b251801a15c2d3abebca04886405ac9d2c609f8bc659d64c37af64af3761f82be5fc9bcae1b0c29e58d60507807d7ab8a330f43ee61e8cd9fa98fa02fea3d4b4577df6424b26eab72ca05988c8911ca6c9035349f"}) syz_mount_image$hfs(&(0x7f00000008c0)='hfs\x00', &(0x7f0000000900)='./file0\x00', 0xb4, 0x2, &(0x7f0000000a80)=[{&(0x7f0000000940)="3f91ea8071eb1f1ad1aa05bdcacc59d1155d648fa0115d9a3ba1b896efc20998410f7fc32e4c562af7fcd8f3738b78e58681f193540a51fd3e611348f39803f54f66ddd2169c1bdc69713b0edb4b1229a30adb78ed2192fd44a0a4cb6a01d6b669a5abe5ec72708eb5d89c149ec1d46504550dbbd16d0f3930a9ac", 0x7b, 0x7}, {&(0x7f00000009c0)="8723f895387c660c3596e4679376b604006eb1b129857a6e05bde83c17dec305d0ef0060f7ef0370a0a04277d458dd8a0ce7a3f4467b7521b9f5bd5ac60cddf9b39721b57c427ea6f74e505f99e0097c4249c68f625d37b62aa548adf67e92651530a9208c5b23d4e1bb98ab31635a4fdba94a4cdac173e11c4c08f242d83a076e9c77f9f287291177e3bbf2992b8e29bd0947adb5bfca", 0x97, 0x8}], 0x0, &(0x7f0000000ac0)={[{@creator={'creator', 0x3d, "379a76de"}}, {@creator={'creator', 0x3d, "3e354fd6"}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r5}}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000c40)={0x8, @win={{0xff, 0x8001, 0x1000, 0x2}, 0x3, 0x6, &(0x7f0000000b40)={{0x6, 0xfffffffffffffffb, 0x4}}, 0xea4, &(0x7f0000000b80)="c3107413e9234d2d0cab19e0f076b25218cbaf01aa4d0681ea9d9c7c08798c21fdf29743928997492099003018e002500bf3e638b3c2521671f7a8db7ce6b926baf280d19955c8f9370c78ce243cdfd31965fa99b6cb0a52e529d3141f93530eea16079108813bd68217c6e6ef20fa9861e9a515ad887cdad9b2a657065331516213967cb0e7f2ce25fec81b7eb8ee7935111e5840f3d994dec89e67f048634f7dc18c3afcaf79da03bffb", 0x10001}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000d80)={0x6, &(0x7f0000000d40)=[{0x10000, 0xfad, 0x67b3, 0x1}, {0x8, 0x8, 0x7, 0x100}, {0x4, 0x5, 0x7, 0x9}, {0x8e7, 0x1, 0x3, 0xfffffffffffffffc}, {0x4, 0x0, 0x650, 0xfffffffffffffffe}, {0x0, 0x80, 0x82, 0x101}]}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000dc0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1}) syz_open_dev$media(&(0x7f0000000e00)='/dev/media#\x00', 0x2ba, 0x111800) ptrace$setregs(0xf, r3, 0x6, &(0x7f0000000e40)="cf4271973379b334ff07c972188fd8fa57df411f8598a825fbfa3840c4747b90f61d7edc8bbe1cfa555d93f99e4ee85dd0913473aff15f4e0a82ed18283af2df2ae69f8e214d83ef815d99ff7227a0134f2e97de446005dca2f5b08df84d71306ebc932e6e4599336d388fb905024d1d487e24cf2223d767b33a90edd45a1ca4aa499f8fe5c96b7463e4fa") ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000f00)={"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"}) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000001300)={0x10001, 0x10001}) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000001340)=""/191, &(0x7f0000001400)=0xbf) 05:20:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0xcb) shutdown(r1, 0x1) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3) [ 152.449166] hfs: unable to parse mount options 05:20:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x80003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'irlan0\x00', {0x2, 0x0, @remote}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000380), &(0x7f00000003c0)=0x4) tkill(r1, 0x1b) 05:20:54 executing program 1: r0 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x4240) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f00000003c0)) r1 = syz_open_dev$midi(0x0, 0x0, 0x10000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) getgroups(0x1, &(0x7f0000000580)=[0xee00]) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)=0x7) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) connect$x25(r1, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x1, 0x1) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0xf5, 0x2}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000340)=0x80000001, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 05:20:54 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x49, 0x7fff, 0x80000000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000, 0xbd, 0x0, 0x800, 0x6, 0x1, 0x0, 0x81, 0x1f, 0x10000, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x8}, 0x0, 0x4, 0x0, 0x5, 0x81, 0x8, 0x100000000}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x80000) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000200)=0x2588, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) 05:20:54 executing program 3: r0 = semget(0x0, 0x0, 0x4) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x101) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/178, 0xb2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7e}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r4, r5) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000500)) r6 = request_key(&(0x7f0000000580)='blacklist\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r5, r6) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa0, r7, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4740}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000004}, 0x804) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000800)={{0x4, 0x10000, 0x3, 0x100000001, 0x7, 0x3}, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0x100000000, "01ea80b6dadc2d065a5f1b1d1349523fbd286f8a5cd657d71b330a536dd29cba848b672815c0a8d4e65d707b251801a15c2d3abebca04886405ac9d2c609f8bc659d64c37af64af3761f82be5fc9bcae1b0c29e58d60507807d7ab8a330f43ee61e8cd9fa98fa02fea3d4b4577df6424b26eab72ca05988c8911ca6c9035349f"}) syz_mount_image$hfs(&(0x7f00000008c0)='hfs\x00', &(0x7f0000000900)='./file0\x00', 0xb4, 0x2, &(0x7f0000000a80)=[{&(0x7f0000000940)="3f91ea8071eb1f1ad1aa05bdcacc59d1155d648fa0115d9a3ba1b896efc20998410f7fc32e4c562af7fcd8f3738b78e58681f193540a51fd3e611348f39803f54f66ddd2169c1bdc69713b0edb4b1229a30adb78ed2192fd44a0a4cb6a01d6b669a5abe5ec72708eb5d89c149ec1d46504550dbbd16d0f3930a9ac", 0x7b, 0x7}, {&(0x7f00000009c0)="8723f895387c660c3596e4679376b604006eb1b129857a6e05bde83c17dec305d0ef0060f7ef0370a0a04277d458dd8a0ce7a3f4467b7521b9f5bd5ac60cddf9b39721b57c427ea6f74e505f99e0097c4249c68f625d37b62aa548adf67e92651530a9208c5b23d4e1bb98ab31635a4fdba94a4cdac173e11c4c08f242d83a076e9c77f9f287291177e3bbf2992b8e29bd0947adb5bfca", 0x97, 0x8}], 0x0, &(0x7f0000000ac0)={[{@creator={'creator', 0x3d, "379a76de"}}, {@creator={'creator', 0x3d, "3e354fd6"}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r5}}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000c40)={0x8, @win={{0xff, 0x8001, 0x1000, 0x2}, 0x3, 0x6, &(0x7f0000000b40)={{0x6, 0xfffffffffffffffb, 0x4}}, 0xea4, &(0x7f0000000b80)="c3107413e9234d2d0cab19e0f076b25218cbaf01aa4d0681ea9d9c7c08798c21fdf29743928997492099003018e002500bf3e638b3c2521671f7a8db7ce6b926baf280d19955c8f9370c78ce243cdfd31965fa99b6cb0a52e529d3141f93530eea16079108813bd68217c6e6ef20fa9861e9a515ad887cdad9b2a657065331516213967cb0e7f2ce25fec81b7eb8ee7935111e5840f3d994dec89e67f048634f7dc18c3afcaf79da03bffb", 0x10001}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000d80)={0x6, &(0x7f0000000d40)=[{0x10000, 0xfad, 0x67b3, 0x1}, {0x8, 0x8, 0x7, 0x100}, {0x4, 0x5, 0x7, 0x9}, {0x8e7, 0x1, 0x3, 0xfffffffffffffffc}, {0x4, 0x0, 0x650, 0xfffffffffffffffe}, {0x0, 0x80, 0x82, 0x101}]}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000dc0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1}) syz_open_dev$media(&(0x7f0000000e00)='/dev/media#\x00', 0x2ba, 0x111800) ptrace$setregs(0xf, r3, 0x6, &(0x7f0000000e40)="cf4271973379b334ff07c972188fd8fa57df411f8598a825fbfa3840c4747b90f61d7edc8bbe1cfa555d93f99e4ee85dd0913473aff15f4e0a82ed18283af2df2ae69f8e214d83ef815d99ff7227a0134f2e97de446005dca2f5b08df84d71306ebc932e6e4599336d388fb905024d1d487e24cf2223d767b33a90edd45a1ca4aa499f8fe5c96b7463e4fa") ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000f00)={"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"}) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000001300)={0x10001, 0x10001}) 05:20:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0xcb) shutdown(r1, 0x1) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3) 05:20:54 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1ff, 0x1) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x18, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x17}]}, 0x18}}, 0x0) [ 154.798885] hfs: unable to parse mount options 05:20:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0xcb) shutdown(r1, 0x1) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3) 05:20:54 executing program 1: r0 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x4240) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f00000003c0)) r1 = syz_open_dev$midi(0x0, 0x0, 0x10000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) getgroups(0x1, &(0x7f0000000580)=[0xee00]) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000300)=0x7) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) connect$x25(r1, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x1, 0x1) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0xf5, 0x2}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000340)=0x80000001, 0x4) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 05:20:54 executing program 3: r0 = semget(0x0, 0x0, 0x4) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x101) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/178, 0xb2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7e}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r4, r5) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000500)) r6 = request_key(&(0x7f0000000580)='blacklist\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r5, r6) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa0, r7, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4740}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000004}, 0x804) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000800)={{0x4, 0x10000, 0x3, 0x100000001, 0x7, 0x3}, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0x100000000, "01ea80b6dadc2d065a5f1b1d1349523fbd286f8a5cd657d71b330a536dd29cba848b672815c0a8d4e65d707b251801a15c2d3abebca04886405ac9d2c609f8bc659d64c37af64af3761f82be5fc9bcae1b0c29e58d60507807d7ab8a330f43ee61e8cd9fa98fa02fea3d4b4577df6424b26eab72ca05988c8911ca6c9035349f"}) syz_mount_image$hfs(&(0x7f00000008c0)='hfs\x00', &(0x7f0000000900)='./file0\x00', 0xb4, 0x2, &(0x7f0000000a80)=[{&(0x7f0000000940)="3f91ea8071eb1f1ad1aa05bdcacc59d1155d648fa0115d9a3ba1b896efc20998410f7fc32e4c562af7fcd8f3738b78e58681f193540a51fd3e611348f39803f54f66ddd2169c1bdc69713b0edb4b1229a30adb78ed2192fd44a0a4cb6a01d6b669a5abe5ec72708eb5d89c149ec1d46504550dbbd16d0f3930a9ac", 0x7b, 0x7}, {&(0x7f00000009c0)="8723f895387c660c3596e4679376b604006eb1b129857a6e05bde83c17dec305d0ef0060f7ef0370a0a04277d458dd8a0ce7a3f4467b7521b9f5bd5ac60cddf9b39721b57c427ea6f74e505f99e0097c4249c68f625d37b62aa548adf67e92651530a9208c5b23d4e1bb98ab31635a4fdba94a4cdac173e11c4c08f242d83a076e9c77f9f287291177e3bbf2992b8e29bd0947adb5bfca", 0x97, 0x8}], 0x0, &(0x7f0000000ac0)={[{@creator={'creator', 0x3d, "379a76de"}}, {@creator={'creator', 0x3d, "3e354fd6"}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r5}}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000c40)={0x8, @win={{0xff, 0x8001, 0x1000, 0x2}, 0x3, 0x6, &(0x7f0000000b40)={{0x6, 0xfffffffffffffffb, 0x4}}, 0xea4, &(0x7f0000000b80)="c3107413e9234d2d0cab19e0f076b25218cbaf01aa4d0681ea9d9c7c08798c21fdf29743928997492099003018e002500bf3e638b3c2521671f7a8db7ce6b926baf280d19955c8f9370c78ce243cdfd31965fa99b6cb0a52e529d3141f93530eea16079108813bd68217c6e6ef20fa9861e9a515ad887cdad9b2a657065331516213967cb0e7f2ce25fec81b7eb8ee7935111e5840f3d994dec89e67f048634f7dc18c3afcaf79da03bffb", 0x10001}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000d80)={0x6, &(0x7f0000000d40)=[{0x10000, 0xfad, 0x67b3, 0x1}, {0x8, 0x8, 0x7, 0x100}, {0x4, 0x5, 0x7, 0x9}, {0x8e7, 0x1, 0x3, 0xfffffffffffffffc}, {0x4, 0x0, 0x650, 0xfffffffffffffffe}, {0x0, 0x80, 0x82, 0x101}]}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000dc0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1}) syz_open_dev$media(&(0x7f0000000e00)='/dev/media#\x00', 0x2ba, 0x111800) ptrace$setregs(0xf, r3, 0x6, &(0x7f0000000e40)="cf4271973379b334ff07c972188fd8fa57df411f8598a825fbfa3840c4747b90f61d7edc8bbe1cfa555d93f99e4ee85dd0913473aff15f4e0a82ed18283af2df2ae69f8e214d83ef815d99ff7227a0134f2e97de446005dca2f5b08df84d71306ebc932e6e4599336d388fb905024d1d487e24cf2223d767b33a90edd45a1ca4aa499f8fe5c96b7463e4fa") ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000f00)={"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"}) 05:20:54 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x7}, {0xa, 0x0, 0x0, @remote}}, 0x5c) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000020c0)=ANY=[@ANYBLOB="636dcb050000c7858d2e5000ff"], 0x1}], 0x1}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x80000) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000040), 0x4) 05:20:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0xcb) shutdown(r1, 0x1) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3) 05:20:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x9, 0x973, 0x0, 0x5, 0x17, 0x10, "03d8750e14dad2f5112ad0de2d53b5f009ea23af544607a893952998fdeac262fce21ab8be4d7e28f2cd20d90f9a7eb38bf8303908fc03846237293b0df16d24", "a73f8f402c5fb8135036716ad250bbe2ba0dcd5bff6d157cd1c7111f63317f15a477af179b832f3215f936c6ed4df460427c5635404006d1f2f49533c2f8cef4", "c1fa0871f0703463d6439f1f78413c1e7e3101239dda62c132785d38542ff9a0", [0xfffe0, 0x2]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000dc0)=""/135, 0x432}, {&(0x7f0000000f80)=""/32, 0x20}], 0x2}}], 0x400000000000136, 0x0, 0x0) 05:20:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) write$selinux_attr(r1, &(0x7f00000000c0)='system_u:object_r:netutils_exec_t:s0\x00', 0x25) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getitimer(0x0, &(0x7f0000000000)) [ 155.164561] hfs: unable to parse mount options 05:20:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x80003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'irlan0\x00', {0x2, 0x0, @remote}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 05:20:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0xcb) shutdown(r0, 0x1) 05:20:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) finit_module(r0, &(0x7f00000001c0)='\x00', 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000180)=0x7fff, 0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) 05:20:57 executing program 3: r0 = semget(0x0, 0x0, 0x4) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x101) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/178, 0xb2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7e}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r4, r5) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000500)) r6 = request_key(&(0x7f0000000580)='blacklist\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r5, r6) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa0, r7, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4740}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000004}, 0x804) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000800)={{0x4, 0x10000, 0x3, 0x100000001, 0x7, 0x3}, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0x100000000, "01ea80b6dadc2d065a5f1b1d1349523fbd286f8a5cd657d71b330a536dd29cba848b672815c0a8d4e65d707b251801a15c2d3abebca04886405ac9d2c609f8bc659d64c37af64af3761f82be5fc9bcae1b0c29e58d60507807d7ab8a330f43ee61e8cd9fa98fa02fea3d4b4577df6424b26eab72ca05988c8911ca6c9035349f"}) syz_mount_image$hfs(&(0x7f00000008c0)='hfs\x00', &(0x7f0000000900)='./file0\x00', 0xb4, 0x2, &(0x7f0000000a80)=[{&(0x7f0000000940)="3f91ea8071eb1f1ad1aa05bdcacc59d1155d648fa0115d9a3ba1b896efc20998410f7fc32e4c562af7fcd8f3738b78e58681f193540a51fd3e611348f39803f54f66ddd2169c1bdc69713b0edb4b1229a30adb78ed2192fd44a0a4cb6a01d6b669a5abe5ec72708eb5d89c149ec1d46504550dbbd16d0f3930a9ac", 0x7b, 0x7}, {&(0x7f00000009c0)="8723f895387c660c3596e4679376b604006eb1b129857a6e05bde83c17dec305d0ef0060f7ef0370a0a04277d458dd8a0ce7a3f4467b7521b9f5bd5ac60cddf9b39721b57c427ea6f74e505f99e0097c4249c68f625d37b62aa548adf67e92651530a9208c5b23d4e1bb98ab31635a4fdba94a4cdac173e11c4c08f242d83a076e9c77f9f287291177e3bbf2992b8e29bd0947adb5bfca", 0x97, 0x8}], 0x0, &(0x7f0000000ac0)={[{@creator={'creator', 0x3d, "379a76de"}}, {@creator={'creator', 0x3d, "3e354fd6"}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r5}}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000c40)={0x8, @win={{0xff, 0x8001, 0x1000, 0x2}, 0x3, 0x6, &(0x7f0000000b40)={{0x6, 0xfffffffffffffffb, 0x4}}, 0xea4, &(0x7f0000000b80)="c3107413e9234d2d0cab19e0f076b25218cbaf01aa4d0681ea9d9c7c08798c21fdf29743928997492099003018e002500bf3e638b3c2521671f7a8db7ce6b926baf280d19955c8f9370c78ce243cdfd31965fa99b6cb0a52e529d3141f93530eea16079108813bd68217c6e6ef20fa9861e9a515ad887cdad9b2a657065331516213967cb0e7f2ce25fec81b7eb8ee7935111e5840f3d994dec89e67f048634f7dc18c3afcaf79da03bffb", 0x10001}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000d80)={0x6, &(0x7f0000000d40)=[{0x10000, 0xfad, 0x67b3, 0x1}, {0x8, 0x8, 0x7, 0x100}, {0x4, 0x5, 0x7, 0x9}, {0x8e7, 0x1, 0x3, 0xfffffffffffffffc}, {0x4, 0x0, 0x650, 0xfffffffffffffffe}, {0x0, 0x80, 0x82, 0x101}]}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000dc0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1}) syz_open_dev$media(&(0x7f0000000e00)='/dev/media#\x00', 0x2ba, 0x111800) ptrace$setregs(0xf, r3, 0x6, &(0x7f0000000e40)="cf4271973379b334ff07c972188fd8fa57df411f8598a825fbfa3840c4747b90f61d7edc8bbe1cfa555d93f99e4ee85dd0913473aff15f4e0a82ed18283af2df2ae69f8e214d83ef815d99ff7227a0134f2e97de446005dca2f5b08df84d71306ebc932e6e4599336d388fb905024d1d487e24cf2223d767b33a90edd45a1ca4aa499f8fe5c96b7463e4fa") 05:20:57 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) creat(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000400)=""/224, 0xe0}], 0x1) renameat2(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x1) 05:20:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x80000, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0x10000, 0x0, [0x200, 0x8, 0x8, 0x61fc, 0x9, 0x10000, 0x1, 0x8]}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r3, &(0x7f00000017c0), 0x1d0, 0x37) 05:20:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) shutdown(r0, 0x1) [ 157.870286] audit: type=1400 audit(1562217657.875:43): avc: denied { create } for pid=7893 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 157.905744] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 05:20:57 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x7dfbc5d4, 0x20, 0x7, 0x8]}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x7b, 0x0, [0xda0]}) [ 157.924592] tc_dump_action: action bad kind [ 157.935923] audit: type=1400 audit(1562217657.905:44): avc: denied { read } for pid=7893 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 157.964866] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 05:20:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) finit_module(r0, &(0x7f00000001c0)='\x00', 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000180)=0x7fff, 0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) [ 157.988980] tc_dump_action: action bad kind 05:20:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) shutdown(r0, 0x1) [ 158.057457] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 158.067840] tc_dump_action: action bad kind [ 158.081830] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 05:20:58 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_gettime(0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13012, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000840)=""/233, 0xe9}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r1, &(0x7f0000000100), 0x8000261, 0xff00) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r3) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r3, 0x48, 0xb5}, &(0x7f0000000180)={'enc=', 'raw', ' hash=', {'rmd128\x00'}}, &(0x7f0000000240)="d60b3f3a5997e471bd419895414a5d8dc679c88751b369ea117618ed81978e480c1e69fabaead211c1cb3c5ff2f645d8fbf6cb79b933659a75e1932feac7a9dcad67768271ac6c6c", &(0x7f00000002c0)=""/181) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) [ 158.114977] hfs: unable to parse mount options 05:20:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) 05:21:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x80003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'irlan0\x00', {0x2, 0x0, @remote}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 05:21:00 executing program 3: r0 = semget(0x0, 0x0, 0x4) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x101) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/178, 0xb2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7e}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r3, r4) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000500)) r5 = request_key(&(0x7f0000000580)='blacklist\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r4, r5) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa0, r6, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4740}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000004}, 0x804) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000800)={{0x4, 0x10000, 0x3, 0x100000001, 0x7, 0x3}, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0x100000000, "01ea80b6dadc2d065a5f1b1d1349523fbd286f8a5cd657d71b330a536dd29cba848b672815c0a8d4e65d707b251801a15c2d3abebca04886405ac9d2c609f8bc659d64c37af64af3761f82be5fc9bcae1b0c29e58d60507807d7ab8a330f43ee61e8cd9fa98fa02fea3d4b4577df6424b26eab72ca05988c8911ca6c9035349f"}) syz_mount_image$hfs(&(0x7f00000008c0)='hfs\x00', &(0x7f0000000900)='./file0\x00', 0xb4, 0x2, &(0x7f0000000a80)=[{&(0x7f0000000940)="3f91ea8071eb1f1ad1aa05bdcacc59d1155d648fa0115d9a3ba1b896efc20998410f7fc32e4c562af7fcd8f3738b78e58681f193540a51fd3e611348f39803f54f66ddd2169c1bdc69713b0edb4b1229a30adb78ed2192fd44a0a4cb6a01d6b669a5abe5ec72708eb5d89c149ec1d46504550dbbd16d0f3930a9ac", 0x7b, 0x7}, {&(0x7f00000009c0)="8723f895387c660c3596e4679376b604006eb1b129857a6e05bde83c17dec305d0ef0060f7ef0370a0a04277d458dd8a0ce7a3f4467b7521b9f5bd5ac60cddf9b39721b57c427ea6f74e505f99e0097c4249c68f625d37b62aa548adf67e92651530a9208c5b23d4e1bb98ab31635a4fdba94a4cdac173e11c4c08f242d83a076e9c77f9f287291177e3bbf2992b8e29bd0947adb5bfca", 0x97, 0x8}], 0x0, &(0x7f0000000ac0)={[{@creator={'creator', 0x3d, "379a76de"}}, {@creator={'creator', 0x3d, "3e354fd6"}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r4}}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000c40)={0x8, @win={{0xff, 0x8001, 0x1000, 0x2}, 0x3, 0x6, &(0x7f0000000b40)={{0x6, 0xfffffffffffffffb, 0x4}}, 0xea4, &(0x7f0000000b80)="c3107413e9234d2d0cab19e0f076b25218cbaf01aa4d0681ea9d9c7c08798c21fdf29743928997492099003018e002500bf3e638b3c2521671f7a8db7ce6b926baf280d19955c8f9370c78ce243cdfd31965fa99b6cb0a52e529d3141f93530eea16079108813bd68217c6e6ef20fa9861e9a515ad887cdad9b2a657065331516213967cb0e7f2ce25fec81b7eb8ee7935111e5840f3d994dec89e67f048634f7dc18c3afcaf79da03bffb", 0x10001}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000d80)={0x6, &(0x7f0000000d40)=[{0x10000, 0xfad, 0x67b3, 0x1}, {0x8, 0x8, 0x7, 0x100}, {0x4, 0x5, 0x7, 0x9}, {0x8e7, 0x1, 0x3, 0xfffffffffffffffc}, {0x4, 0x0, 0x650, 0xfffffffffffffffe}, {0x0, 0x80, 0x82, 0x101}]}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000dc0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1}) syz_open_dev$media(&(0x7f0000000e00)='/dev/media#\x00', 0x2ba, 0x111800) 05:21:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) 05:21:00 executing program 4: getitimer(0x2, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000040), 0x4) 05:21:00 executing program 1: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000080)=0x1, 0x4) lseek(r0, 0x7fffffffffffc, 0x0) readv(r0, &(0x7f00000014c0)=[{&(0x7f00000000c0)=""/34, 0x22}, {&(0x7f0000000100)=""/102, 0x66}, {0xfffffffffffffffe}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/248, 0x259}, {&(0x7f00000012c0)=""/17, 0x11}, {&(0x7f0000001540)=""/97, 0x13}], 0x7) ioctl$void(r0, 0xc0045c78) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000001400)=0x40) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000000)) 05:21:00 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x2) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:21:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) [ 160.921574] hfs: unable to parse mount options 05:21:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1000, 0x1) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x40000000}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x401}, &(0x7f0000000180)=0x8) syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x8) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/87, 0x57}, {&(0x7f0000000280)=""/133, 0x85}, {&(0x7f0000000380)=""/133, 0x85}, {&(0x7f0000000440)=""/11, 0xb}, {&(0x7f0000000480)=""/69, 0x45}, {&(0x7f0000000500)=""/170, 0xaa}], 0x6, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000340)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x14) 05:21:01 executing program 3: r0 = semget(0x0, 0x0, 0x4) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0x3) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000040)=0x101) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r1, &(0x7f00000000c0)=""/178, 0xb2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7e}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r3, r4) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000500)) r5 = request_key(&(0x7f0000000580)='blacklist\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='\x00', 0xfffffffffffffffd) keyctl$get_persistent(0x16, r4, r5) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)={0xa0, r6, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4740}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb5}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000004}, 0x804) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000800)={{0x4, 0x10000, 0x3, 0x100000001, 0x7, 0x3}, 0xfffffffffffffffa, 0x4, 0x5, 0x9, 0x100000000, "01ea80b6dadc2d065a5f1b1d1349523fbd286f8a5cd657d71b330a536dd29cba848b672815c0a8d4e65d707b251801a15c2d3abebca04886405ac9d2c609f8bc659d64c37af64af3761f82be5fc9bcae1b0c29e58d60507807d7ab8a330f43ee61e8cd9fa98fa02fea3d4b4577df6424b26eab72ca05988c8911ca6c9035349f"}) syz_mount_image$hfs(&(0x7f00000008c0)='hfs\x00', &(0x7f0000000900)='./file0\x00', 0xb4, 0x2, &(0x7f0000000a80)=[{&(0x7f0000000940)="3f91ea8071eb1f1ad1aa05bdcacc59d1155d648fa0115d9a3ba1b896efc20998410f7fc32e4c562af7fcd8f3738b78e58681f193540a51fd3e611348f39803f54f66ddd2169c1bdc69713b0edb4b1229a30adb78ed2192fd44a0a4cb6a01d6b669a5abe5ec72708eb5d89c149ec1d46504550dbbd16d0f3930a9ac", 0x7b, 0x7}, {&(0x7f00000009c0)="8723f895387c660c3596e4679376b604006eb1b129857a6e05bde83c17dec305d0ef0060f7ef0370a0a04277d458dd8a0ce7a3f4467b7521b9f5bd5ac60cddf9b39721b57c427ea6f74e505f99e0097c4249c68f625d37b62aa548adf67e92651530a9208c5b23d4e1bb98ab31635a4fdba94a4cdac173e11c4c08f242d83a076e9c77f9f287291177e3bbf2992b8e29bd0947adb5bfca", 0x97, 0x8}], 0x0, &(0x7f0000000ac0)={[{@creator={'creator', 0x3d, "379a76de"}}, {@creator={'creator', 0x3d, "3e354fd6"}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r4}}]}) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000c40)={0x8, @win={{0xff, 0x8001, 0x1000, 0x2}, 0x3, 0x6, &(0x7f0000000b40)={{0x6, 0xfffffffffffffffb, 0x4}}, 0xea4, &(0x7f0000000b80)="c3107413e9234d2d0cab19e0f076b25218cbaf01aa4d0681ea9d9c7c08798c21fdf29743928997492099003018e002500bf3e638b3c2521671f7a8db7ce6b926baf280d19955c8f9370c78ce243cdfd31965fa99b6cb0a52e529d3141f93530eea16079108813bd68217c6e6ef20fa9861e9a515ad887cdad9b2a657065331516213967cb0e7f2ce25fec81b7eb8ee7935111e5840f3d994dec89e67f048634f7dc18c3afcaf79da03bffb", 0x10001}}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000d80)={0x6, &(0x7f0000000d40)=[{0x10000, 0xfad, 0x67b3, 0x1}, {0x8, 0x8, 0x7, 0x100}, {0x4, 0x5, 0x7, 0x9}, {0x8e7, 0x1, 0x3, 0xfffffffffffffffc}, {0x4, 0x0, 0x650, 0xfffffffffffffffe}, {0x0, 0x80, 0x82, 0x101}]}, 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000dc0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x1}) 05:21:01 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x2) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:21:01 executing program 1: r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x2) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000000)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 05:21:01 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) shutdown(r0, 0x1) [ 161.149132] hfs: unable to parse mount options [ 161.237864] WARNING: CPU: 0 PID: 1277 at drivers/tty/tty_ioctl.c:319 tty_set_termios+0x7a5/0x8d0 [ 161.247459] Kernel panic - not syncing: panic_on_warn set ... [ 161.247459] [ 161.255013] CPU: 0 PID: 1277 Comm: kworker/u5:0 Not tainted 4.19.57 #29 [ 161.261754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.271112] Workqueue: hci0 hci_power_on [ 161.275158] Call Trace: [ 161.277734] dump_stack+0x172/0x1f0 [ 161.281449] panic+0x263/0x507 [ 161.284629] ? __warn_printk+0xf3/0xf3 [ 161.288520] ? tty_set_termios+0x7a5/0x8d0 [ 161.292740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 161.298285] ? __warn.cold+0x5/0x4a [ 161.302177] ? __warn+0xe8/0x1d0 [ 161.305558] ? tty_set_termios+0x7a5/0x8d0 [ 161.309780] __warn.cold+0x20/0x4a [ 161.313307] ? tty_set_termios+0x7a5/0x8d0 [ 161.317533] report_bug+0x263/0x2b0 [ 161.321152] do_error_trap+0x204/0x360 [ 161.325027] ? math_error+0x340/0x340 [ 161.328817] ? error_entry+0x76/0xd0 [ 161.332693] ? trace_hardirqs_off_caller+0x65/0x220 [ 161.337700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 161.342534] do_invalid_op+0x1b/0x20 [ 161.346233] invalid_op+0x14/0x20 [ 161.349679] RIP: 0010:tty_set_termios+0x7a5/0x8d0 [ 161.354509] Code: 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 a3 00 00 00 45 89 a7 d0 03 00 00 e9 49 fe ff ff e8 bb 2d 05 fe <0f> 0b e9 3e f9 ff ff e8 df 9b 3b fe e9 d6 fa ff ff e8 d5 9b 3b fe [ 161.373396] RSP: 0018:ffff8880a64ef990 EFLAGS: 00010293 [ 161.378834] RAX: ffff8880a64da080 RBX: ffff8880a64efa50 RCX: ffffffff8365e22d [ 161.386175] RDX: 0000000000000000 RSI: ffffffff8365e8f5 RDI: 0000000000000005 [ 161.393428] RBP: ffff8880a64efa78 R08: ffff8880a64da080 R09: fffffbfff15dcdc9 [ 161.400690] R10: fffffbfff15dcdc8 R11: 0000000000000003 R12: ffff8880a64efab8 [ 161.407965] R13: 0000000000010004 R14: 1ffff11014c9df51 R15: ffff8880a1914080 [ 161.415426] ? tty_set_termios+0xdd/0x8d0 [ 161.419559] ? tty_set_termios+0x7a5/0x8d0 [ 161.423798] ? tty_wait_until_sent+0x580/0x580 [ 161.428393] ? __mutex_lock+0x3cd/0x1300 [ 161.432444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 161.437971] ? tty_termios_encode_baud_rate+0x3ca/0x4e0 [ 161.443330] hci_uart_set_baudrate+0x157/0x1c0 [ 161.447903] ? hci_uart_set_speeds+0x90/0x90 [ 161.452304] ? debug_object_deactivate+0x1e4/0x360 [ 161.457242] hci_uart_setup+0xa2/0x490 [ 161.461116] ? hci_uart_set_baudrate+0x1c0/0x1c0 [ 161.465859] hci_dev_do_open+0x674/0x14a0 [ 161.469997] ? hci_rx_work+0xaa0/0xaa0 [ 161.473891] ? kasan_check_read+0x11/0x20 [ 161.478037] ? process_one_work+0x890/0x1750 [ 161.482443] ? find_held_lock+0x35/0x130 [ 161.486493] hci_power_on+0x10d/0x580 [ 161.490282] ? hci_error_reset+0xf0/0xf0 [ 161.494327] ? __lock_is_held+0xb6/0x140 [ 161.498386] process_one_work+0x989/0x1750 [ 161.502698] ? pwq_dec_nr_in_flight+0x320/0x320 [ 161.507361] ? kasan_check_write+0x14/0x20 [ 161.511585] ? do_raw_spin_lock+0xc8/0x240 [ 161.515841] worker_thread+0x98/0xe40 [ 161.519639] kthread+0x354/0x420 [ 161.522990] ? process_one_work+0x1750/0x1750 [ 161.527471] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 161.532993] ret_from_fork+0x24/0x30 [ 161.538380] Kernel Offset: disabled [ 161.542088] Rebooting in 86400 seconds..