/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000180)={0x1, 0x102, 0x2, {0x1, 0x3, 0x59ef, 0x400000000000}}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000006000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12-simd\x00'}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r3}) 22:13:57 executing program 0 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:13:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x84000000, 0x15, 0x0, &(0x7f00000000c0)) 22:13:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) 22:13:57 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x2, 0x240c0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f00000000c0)=0x4, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400201) fadvise64(r1, 0x0, 0x80000001, 0x5) flistxattr(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={r4, 0x1}, &(0x7f0000000200)=0x8) 22:13:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0xa4ffffff, 0x15, 0x0, &(0x7f00000000c0)) 22:13:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) [ 404.359871][T16698] FAULT_INJECTION: forcing a failure. [ 404.359871][T16698] name failslab, interval 1, probability 0, space 0, times 0 [ 404.392903][T16698] CPU: 1 PID: 16698 Comm: syz-executor.0 Not tainted 5.3.0-rc2-next-20190801 #57 [ 404.402053][T16698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.402059][T16698] Call Trace: [ 404.402087][T16698] dump_stack+0x172/0x1f0 [ 404.402119][T16698] should_fail.cold+0xa/0x15 [ 404.424369][T16698] ? __kasan_check_read+0x11/0x20 [ 404.424389][T16698] ? fault_create_debugfs_attr+0x180/0x180 [ 404.424411][T16698] ? page_to_nid.part.0+0x20/0x20 [ 404.440282][T16698] ? ___might_sleep+0x163/0x280 [ 404.445147][T16698] __should_failslab+0x121/0x190 [ 404.450097][T16698] should_failslab+0x9/0x14 [ 404.454616][T16698] kmem_cache_alloc_node_trace+0x274/0x750 [ 404.454629][T16698] ? kasan_unpoison_shadow+0x35/0x50 [ 404.454650][T16698] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 404.467136][T16698] __kmalloc_node_track_caller+0x3d/0x70 [ 404.467154][T16698] __kmalloc_reserve.isra.0+0x40/0xf0 [ 404.467168][T16698] __alloc_skb+0x10b/0x5e0 [ 404.467182][T16698] ? netdev_alloc_frag+0x1b0/0x1b0 [ 404.467206][T16698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.499820][T16698] ? netlink_autobind.isra.0+0x228/0x310 [ 404.505470][T16698] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 404.511723][T16698] netlink_sendmsg+0x972/0xd60 [ 404.516500][T16698] ? netlink_unicast+0x710/0x710 [ 404.521441][T16698] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 404.527000][T16698] ? apparmor_socket_sendmsg+0x2a/0x30 [ 404.532475][T16698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.538741][T16698] ? security_socket_sendmsg+0x8d/0xc0 [ 404.544218][T16698] ? netlink_unicast+0x710/0x710 [ 404.549169][T16698] sock_sendmsg+0xd7/0x130 [ 404.553598][T16698] ___sys_sendmsg+0x803/0x920 [ 404.558285][T16698] ? copy_msghdr_from_user+0x440/0x440 [ 404.563754][T16698] ? __fget+0xa3/0x560 [ 404.567836][T16698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.574087][T16698] ? __fget+0x384/0x560 [ 404.578253][T16698] ? ksys_dup3+0x3e0/0x3e0 [ 404.582683][T16698] ? __fget_light+0x1a9/0x230 [ 404.587374][T16698] ? __fdget+0x1b/0x20 [ 404.591455][T16698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 404.597708][T16698] __sys_sendmsg+0x105/0x1d0 [ 404.602306][T16698] ? __sys_sendmsg_sock+0xd0/0xd0 [ 404.607345][T16698] ? switch_fpu_return+0x1fa/0x4f0 [ 404.612480][T16698] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 404.618574][T16698] __x64_sys_sendmsg+0x78/0xb0 [ 404.623359][T16698] do_syscall_64+0xfa/0x760 [ 404.627880][T16698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.633774][T16698] RIP: 0033:0x459829 [ 404.637671][T16698] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:13:58 executing program 3 (fault-call:2 fault-nth:3): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:13:58 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x80000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r1, 0x208, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xf195}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5e}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x93d}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x46}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:13:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB]], 0x30}, 0x0) 22:13:58 executing program 4: r0 = socket$inet(0x2, 0x2800080001, 0x84) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000180)={0x1, 0x102, 0x2, {0x1, 0x3, 0x59ef, 0x400000000000}}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000006000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12-simd\x00'}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) [ 404.657302][T16698] RSP: 002b:00007f09e54c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 404.665725][T16698] RAX: ffffffffffffffda RBX: 00007f09e54c3c90 RCX: 0000000000459829 [ 404.673700][T16698] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000005 [ 404.681676][T16698] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 404.689654][T16698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09e54c46d4 [ 404.697643][T16698] R13: 00000000004c7743 R14: 00000000004dce88 R15: 0000000000000006 22:13:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0xffffffa4, 0x15, 0x0, &(0x7f00000000c0)) 22:13:58 executing program 0 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:13:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB]], 0x30}, 0x0) [ 404.820076][T16711] FAULT_INJECTION: forcing a failure. [ 404.820076][T16711] name failslab, interval 1, probability 0, space 0, times 0 [ 404.862195][T16711] CPU: 1 PID: 16711 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190801 #57 [ 404.871350][T16711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.881435][T16711] Call Trace: [ 404.881469][T16711] dump_stack+0x172/0x1f0 [ 404.881497][T16711] should_fail.cold+0xa/0x15 [ 404.887804][T16813] FAULT_INJECTION: forcing a failure. [ 404.887804][T16813] name failslab, interval 1, probability 0, space 0, times 0 [ 404.889113][T16711] ? fault_create_debugfs_attr+0x180/0x180 [ 404.889141][T16711] ? page_to_nid.part.0+0x20/0x20 [ 404.906307][T16711] ? ___might_sleep+0x163/0x280 [ 404.906325][T16711] __should_failslab+0x121/0x190 [ 404.906342][T16711] should_failslab+0x9/0x14 [ 404.906361][T16711] kmem_cache_alloc+0x2aa/0x710 [ 404.936284][T16711] ? lock_acquire+0x190/0x410 [ 404.940978][T16711] ? current_time+0x6b/0x140 [ 404.945588][T16711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.945605][T16711] ? timespec64_trunc+0xf0/0x180 [ 404.945626][T16711] __d_alloc+0x2e/0x8c0 [ 404.960959][T16711] d_alloc_pseudo+0x1e/0x70 [ 404.965497][T16711] alloc_file_pseudo+0xe2/0x280 [ 404.965513][T16711] ? alloc_file+0x4d0/0x4d0 [ 404.965536][T16711] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 404.974891][T16711] __shmem_file_setup.part.0+0x108/0x2b0 [ 404.974911][T16711] shmem_file_setup+0x66/0x90 [ 404.991454][T16711] __x64_sys_memfd_create+0x2a2/0x470 [ 404.991472][T16711] ? memfd_fcntl+0x1580/0x1580 [ 404.991488][T16711] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 404.991511][T16711] ? trace_hardirqs_off_caller+0x65/0x230 [ 405.013549][T16711] ? trace_hardirqs_on+0x67/0x240 [ 405.018589][T16711] do_syscall_64+0xfa/0x760 [ 405.023132][T16711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.029039][T16711] RIP: 0033:0x459829 [ 405.032950][T16711] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.052574][T16711] RSP: 002b:00007f0bba52aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 22:13:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x7ffffffff000, 0x15, 0x0, &(0x7f00000000c0)) 22:13:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000140)={{0x2, 0x4e21, @multicast1}, {0x306, @random="18dc94e3fcb9"}, 0x44, {0x2, 0x4e21, @remote}, 'bridge_slave_1\x00'}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000100)={0x0, 0x5, 0x6408, &(0x7f00000000c0)=0x4}) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000080)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) [ 405.060994][T16711] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 405.068971][T16711] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 405.076946][T16711] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 405.084921][T16711] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0bba52b6d4 [ 405.092923][T16711] R13: 00000000004c89bb R14: 00000000004df7e0 R15: 0000000000000005 [ 405.100916][T16813] CPU: 0 PID: 16813 Comm: syz-executor.0 Not tainted 5.3.0-rc2-next-20190801 #57 [ 405.110046][T16813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.120109][T16813] Call Trace: [ 405.123410][T16813] dump_stack+0x172/0x1f0 [ 405.127744][T16813] should_fail.cold+0xa/0x15 [ 405.132339][T16813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.138588][T16813] ? fault_create_debugfs_attr+0x180/0x180 [ 405.144400][T16813] ? netlink_remove_tap+0x4d0/0x4d0 [ 405.149612][T16813] __should_failslab+0x121/0x190 [ 405.154559][T16813] should_failslab+0x9/0x14 [ 405.159069][T16813] kmem_cache_alloc+0x47/0x710 [ 405.163847][T16813] ? lock_acquire+0x190/0x410 [ 405.168533][T16813] ? netlink_deliver_tap+0x146/0xbf0 [ 405.173826][T16813] skb_clone+0x154/0x3d0 [ 405.178073][T16813] netlink_deliver_tap+0x94d/0xbf0 [ 405.183194][T16813] netlink_unicast+0x5a2/0x710 [ 405.187978][T16813] ? netlink_attachskb+0x7c0/0x7c0 [ 405.193109][T16813] ? _copy_from_iter_full+0x25d/0x8a0 [ 405.198515][T16813] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 405.204241][T16813] ? __check_object_size+0x3d/0x43c [ 405.209463][T16813] netlink_sendmsg+0x8a5/0xd60 [ 405.214253][T16813] ? netlink_unicast+0x710/0x710 [ 405.219202][T16813] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 405.224766][T16813] ? apparmor_socket_sendmsg+0x2a/0x30 [ 405.230235][T16813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.236483][T16813] ? security_socket_sendmsg+0x8d/0xc0 [ 405.241960][T16813] ? netlink_unicast+0x710/0x710 [ 405.246926][T16813] sock_sendmsg+0xd7/0x130 [ 405.251383][T16813] ___sys_sendmsg+0x803/0x920 [ 405.256077][T16813] ? copy_msghdr_from_user+0x440/0x440 [ 405.261549][T16813] ? __fget+0xa3/0x560 [ 405.265640][T16813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.271956][T16813] ? __fget+0x384/0x560 [ 405.276947][T16813] ? ksys_dup3+0x3e0/0x3e0 [ 405.281386][T16813] ? __fget_light+0x1a9/0x230 [ 405.286077][T16813] ? __fdget+0x1b/0x20 [ 405.290185][T16813] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.296445][T16813] __sys_sendmsg+0x105/0x1d0 [ 405.301046][T16813] ? __sys_sendmsg_sock+0xd0/0xd0 [ 405.306091][T16813] ? switch_fpu_return+0x1fa/0x4f0 [ 405.311302][T16813] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 405.317381][T16813] __x64_sys_sendmsg+0x78/0xb0 [ 405.322934][T16813] do_syscall_64+0xfa/0x760 [ 405.327472][T16813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.333376][T16813] RIP: 0033:0x459829 [ 405.337861][T16813] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:13:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x40, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000100)=0x2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xa000, 0x0) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000040)=0x1000, &(0x7f0000000080)=0x4) userfaultfd(0x80000) 22:13:58 executing program 3 (fault-call:2 fault-nth:4): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:13:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB]], 0x30}, 0x0) [ 405.358591][T16813] RSP: 002b:00007f09e54c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 405.367016][T16813] RAX: ffffffffffffffda RBX: 00007f09e54c3c90 RCX: 0000000000459829 [ 405.374994][T16813] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000005 [ 405.382981][T16813] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 405.390965][T16813] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09e54c46d4 [ 405.398975][T16813] R13: 00000000004c7743 R14: 00000000004dce88 R15: 0000000000000006 22:13:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0xf0ffffff7f0000, 0x15, 0x0, &(0x7f00000000c0)) [ 405.461082][T16927] FAULT_INJECTION: forcing a failure. [ 405.461082][T16927] name failslab, interval 1, probability 0, space 0, times 0 [ 405.473879][T16927] CPU: 0 PID: 16927 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190801 #57 [ 405.483021][T16927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.493097][T16927] Call Trace: [ 405.493130][T16927] dump_stack+0x172/0x1f0 [ 405.493152][T16927] should_fail.cold+0xa/0x15 [ 405.493169][T16927] ? fault_create_debugfs_attr+0x180/0x180 [ 405.493189][T16927] ? page_to_nid.part.0+0x20/0x20 [ 405.493215][T16927] ? ___might_sleep+0x163/0x280 [ 405.500833][T16927] __should_failslab+0x121/0x190 [ 405.526021][T16927] should_failslab+0x9/0x14 [ 405.530532][T16927] kmem_cache_alloc+0x2aa/0x710 [ 405.535389][T16927] ? memcg_kmem_put_cache+0x3e/0x50 [ 405.540604][T16927] ? kmem_cache_alloc+0x314/0x710 [ 405.545643][T16927] security_file_alloc+0x39/0x170 [ 405.550682][T16927] __alloc_file+0xde/0x340 [ 405.555161][T16927] alloc_empty_file+0x72/0x170 [ 405.559968][T16927] alloc_file+0x5e/0x4d0 [ 405.564314][T16927] alloc_file_pseudo+0x189/0x280 [ 405.569378][T16927] ? alloc_file+0x4d0/0x4d0 [ 405.573920][T16927] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 405.580215][T16927] __shmem_file_setup.part.0+0x108/0x2b0 [ 405.585866][T16927] shmem_file_setup+0x66/0x90 [ 405.590570][T16927] __x64_sys_memfd_create+0x2a2/0x470 [ 405.596060][T16927] ? memfd_fcntl+0x1580/0x1580 [ 405.600836][T16927] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 22:13:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x100000000000000, 0x15, 0x0, &(0x7f00000000c0)) [ 405.607097][T16927] ? trace_hardirqs_off_caller+0x65/0x230 [ 405.612833][T16927] ? trace_hardirqs_on+0x67/0x240 [ 405.617980][T16927] do_syscall_64+0xfa/0x760 [ 405.622498][T16927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.628569][T16927] RIP: 0033:0x459829 [ 405.632481][T16927] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.652117][T16927] RSP: 002b:00007f0bba52aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 22:13:59 executing program 0 (fault-call:4 fault-nth:3): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 405.660545][T16927] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 405.668696][T16927] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 405.676947][T16927] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 405.685060][T16927] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0bba52b6d4 [ 405.693136][T16927] R13: 00000000004c89bb R14: 00000000004df7e0 R15: 0000000000000005 22:13:59 executing program 4: r0 = socket$inet(0x2, 0x2800080001, 0x84) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000180)={0x1, 0x102, 0x2, {0x1, 0x3, 0x59ef, 0x400000000000}}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000006000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12-simd\x00'}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) 22:13:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)="7601b7e831abf5d80a0dc7aefb4ed50745890fc1031157fb5df63ccb3d96dd30870d66d779939c3b0d0f0d95d2be51038bd4e9fc34feac7c4d06dd07db955fc7738aa216a96ebeda44061400c837905d805c149bbdabbe8a76938dc9d83b748334cf6374da3217d1393a7b3a83f6eb279121b347d1d9d45297579a4c9db5de15755eff8eeb1e59e937714f067b602db373c4b3298f062df9d1d617b38ba3eb0e4ca822cf072dea3084b0f842", 0xac, r0}, 0x68) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:13:59 executing program 3 (fault-call:2 fault-nth:5): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:13:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB], 0x30}, 0x0) [ 405.806077][T17038] FAULT_INJECTION: forcing a failure. [ 405.806077][T17038] name failslab, interval 1, probability 0, space 0, times 0 22:13:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB], 0x30}, 0x0) [ 405.857663][T17059] FAULT_INJECTION: forcing a failure. [ 405.857663][T17059] name failslab, interval 1, probability 0, space 0, times 0 [ 405.881584][T17038] CPU: 0 PID: 17038 Comm: syz-executor.0 Not tainted 5.3.0-rc2-next-20190801 #57 [ 405.890746][T17038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.900845][T17038] Call Trace: [ 405.904190][T17038] dump_stack+0x172/0x1f0 [ 405.908602][T17038] should_fail.cold+0xa/0x15 [ 405.913227][T17038] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 405.918835][T17038] ? fault_create_debugfs_attr+0x180/0x180 [ 405.925659][T17038] ? page_to_nid.part.0+0x20/0x20 [ 405.930713][T17038] ? ___might_sleep+0x163/0x280 [ 405.935609][T17038] __should_failslab+0x121/0x190 [ 405.940584][T17038] should_failslab+0x9/0x14 [ 405.945118][T17038] kmem_cache_alloc_node+0x268/0x740 [ 405.950551][T17038] ? netdev_run_todo+0x559/0x7b0 [ 405.955603][T17038] __alloc_skb+0xd5/0x5e0 [ 405.960407][T17038] ? netdev_alloc_frag+0x1b0/0x1b0 [ 405.965561][T17038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.971845][T17038] ? addrconf_prefix_rcv_add_addr+0x860/0x860 [ 405.977943][T17038] netlink_ack+0x25c/0xb30 [ 405.982489][T17038] ? netlink_sendmsg+0xd60/0xd60 [ 405.987441][T17038] ? __copy_skb_header+0x270/0x550 [ 405.992576][T17038] netlink_rcv_skb+0x376/0x450 [ 405.997401][T17038] ? rtnetlink_put_metrics+0x580/0x580 [ 406.002925][T17038] ? netlink_ack+0xb30/0xb30 [ 406.007547][T17038] ? netlink_deliver_tap+0x254/0xbf0 [ 406.012861][T17038] rtnetlink_rcv+0x1d/0x30 [ 406.017305][T17038] netlink_unicast+0x531/0x710 [ 406.022086][T17038] ? netlink_attachskb+0x7c0/0x7c0 [ 406.027208][T17038] ? _copy_from_iter_full+0x25d/0x8a0 [ 406.032595][T17038] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 406.038328][T17038] ? __check_object_size+0x3d/0x43c [ 406.043574][T17038] netlink_sendmsg+0x8a5/0xd60 [ 406.048358][T17038] ? netlink_unicast+0x710/0x710 [ 406.053444][T17038] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 406.064401][T17038] ? apparmor_socket_sendmsg+0x2a/0x30 [ 406.064418][T17038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.064434][T17038] ? security_socket_sendmsg+0x8d/0xc0 [ 406.064459][T17038] ? netlink_unicast+0x710/0x710 [ 406.076283][T17038] sock_sendmsg+0xd7/0x130 [ 406.091280][T17038] ___sys_sendmsg+0x803/0x920 [ 406.096005][T17038] ? copy_msghdr_from_user+0x440/0x440 [ 406.101491][T17038] ? __fget+0xa3/0x560 [ 406.105590][T17038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.111940][T17038] ? __fget+0x384/0x560 [ 406.116132][T17038] ? ksys_dup3+0x3e0/0x3e0 [ 406.120572][T17038] ? __fget_light+0x1a9/0x230 [ 406.125263][T17038] ? __fdget+0x1b/0x20 [ 406.129353][T17038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 406.136317][T17038] __sys_sendmsg+0x105/0x1d0 [ 406.140937][T17038] ? __sys_sendmsg_sock+0xd0/0xd0 [ 406.146005][T17038] ? switch_fpu_return+0x1fa/0x4f0 [ 406.151153][T17038] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 406.157245][T17038] __x64_sys_sendmsg+0x78/0xb0 [ 406.162033][T17038] do_syscall_64+0xfa/0x760 [ 406.166656][T17038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.172596][T17038] RIP: 0033:0x459829 [ 406.176517][T17038] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.196136][T17038] RSP: 002b:00007f09e54c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 22:13:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x8400000000000000, 0x15, 0x0, &(0x7f00000000c0)) [ 406.204558][T17038] RAX: ffffffffffffffda RBX: 00007f09e54c3c90 RCX: 0000000000459829 [ 406.212540][T17038] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000005 [ 406.220531][T17038] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 406.228514][T17038] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09e54c46d4 [ 406.236504][T17038] R13: 00000000004c7743 R14: 00000000004dce88 R15: 0000000000000006 [ 406.249718][T17059] CPU: 1 PID: 17059 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190801 #57 [ 406.258954][T17059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.269017][T17059] Call Trace: [ 406.272336][T17059] dump_stack+0x172/0x1f0 [ 406.276691][T17059] should_fail.cold+0xa/0x15 [ 406.281302][T17059] ? fault_create_debugfs_attr+0x180/0x180 [ 406.287134][T17059] ? page_to_nid.part.0+0x20/0x20 [ 406.292187][T17059] ? ___might_sleep+0x163/0x280 [ 406.297096][T17059] __should_failslab+0x121/0x190 [ 406.302057][T17059] should_failslab+0x9/0x14 [ 406.306586][T17059] kmem_cache_alloc+0x2aa/0x710 [ 406.311468][T17059] ? memcg_kmem_put_cache+0x3e/0x50 [ 406.316704][T17059] ? kmem_cache_alloc+0x314/0x710 [ 406.321841][T17059] security_file_alloc+0x39/0x170 [ 406.326896][T17059] __alloc_file+0xde/0x340 [ 406.331344][T17059] alloc_empty_file+0x72/0x170 [ 406.336143][T17059] alloc_file+0x5e/0x4d0 [ 406.340426][T17059] alloc_file_pseudo+0x189/0x280 [ 406.345398][T17059] ? alloc_file+0x4d0/0x4d0 [ 406.349932][T17059] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 406.354530][T17156] FAULT_INJECTION: forcing a failure. [ 406.354530][T17156] name failslab, interval 1, probability 0, space 0, times 0 [ 406.356192][T17059] __shmem_file_setup.part.0+0x108/0x2b0 [ 406.356210][T17059] shmem_file_setup+0x66/0x90 [ 406.356236][T17059] __x64_sys_memfd_create+0x2a2/0x470 [ 406.386011][T17059] ? memfd_fcntl+0x1580/0x1580 [ 406.390803][T17059] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 406.396907][T17059] ? trace_hardirqs_off_caller+0x65/0x230 [ 406.402680][T17059] ? trace_hardirqs_on+0x67/0x240 [ 406.407733][T17059] do_syscall_64+0xfa/0x760 [ 406.412287][T17059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.418198][T17059] RIP: 0033:0x459829 [ 406.422387][T17059] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.442008][T17059] RSP: 002b:00007f0bba52aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 406.450455][T17059] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 22:13:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x1) ioctl$VFIO_GET_API_VERSION(r1, 0x3b64) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:13:59 executing program 0 (fault-call:4 fault-nth:4): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:13:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) prctl$PR_GET_SECCOMP(0x15) flistxattr(0xffffffffffffffff, 0x0, 0x0) io_setup(0x2, &(0x7f0000000040)=0x0) io_submit(r1, 0x0, &(0x7f0000000080)) [ 406.458537][T17059] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 406.467614][T17059] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 406.475727][T17059] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0bba52b6d4 [ 406.483712][T17059] R13: 00000000004c89bb R14: 00000000004df7e0 R15: 0000000000000005 [ 406.491785][T17156] CPU: 0 PID: 17156 Comm: syz-executor.0 Not tainted 5.3.0-rc2-next-20190801 #57 [ 406.501077][T17156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.511287][T17156] Call Trace: [ 406.511314][T17156] dump_stack+0x172/0x1f0 [ 406.511332][T17156] should_fail.cold+0xa/0x15 [ 406.511346][T17156] ? fault_create_debugfs_attr+0x180/0x180 [ 406.511362][T17156] ? page_to_nid.part.0+0x20/0x20 [ 406.511376][T17156] ? ___might_sleep+0x163/0x280 [ 406.511393][T17156] __should_failslab+0x121/0x190 [ 406.511409][T17156] should_failslab+0x9/0x14 [ 406.511421][T17156] kmem_cache_alloc_node_trace+0x274/0x750 [ 406.511443][T17156] ? kasan_unpoison_shadow+0x35/0x50 [ 406.529612][T17156] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 406.529630][T17156] __kmalloc_node_track_caller+0x3d/0x70 [ 406.529653][T17156] __kmalloc_reserve.isra.0+0x40/0xf0 [ 406.544475][T17156] __alloc_skb+0x10b/0x5e0 [ 406.544490][T17156] ? netdev_alloc_frag+0x1b0/0x1b0 [ 406.544506][T17156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 406.544522][T17156] ? addrconf_prefix_rcv_add_addr+0x860/0x860 [ 406.544538][T17156] netlink_ack+0x25c/0xb30 [ 406.544552][T17156] ? netlink_sendmsg+0xd60/0xd60 [ 406.544565][T17156] ? __copy_skb_header+0x270/0x550 [ 406.544586][T17156] netlink_rcv_skb+0x376/0x450 [ 406.555018][T17156] ? rtnetlink_put_metrics+0x580/0x580 [ 406.555033][T17156] ? netlink_ack+0xb30/0xb30 [ 406.555049][T17156] ? netlink_deliver_tap+0x254/0xbf0 [ 406.555065][T17156] rtnetlink_rcv+0x1d/0x30 [ 406.555076][T17156] netlink_unicast+0x531/0x710 [ 406.555090][T17156] ? netlink_attachskb+0x7c0/0x7c0 [ 406.555104][T17156] ? _copy_from_iter_full+0x25d/0x8a0 [ 406.555119][T17156] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 406.555134][T17156] ? __check_object_size+0x3d/0x43c [ 406.555148][T17156] netlink_sendmsg+0x8a5/0xd60 [ 406.555169][T17156] ? netlink_unicast+0x710/0x710 [ 406.566372][T17156] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 406.577391][T17156] ? apparmor_socket_sendmsg+0x2a/0x30 [ 406.577408][T17156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.577424][T17156] ? security_socket_sendmsg+0x8d/0xc0 [ 406.577446][T17156] ? netlink_unicast+0x710/0x710 [ 406.665377][T17156] sock_sendmsg+0xd7/0x130 [ 406.665393][T17156] ___sys_sendmsg+0x803/0x920 [ 406.665409][T17156] ? copy_msghdr_from_user+0x440/0x440 [ 406.665425][T17156] ? __fget+0xa3/0x560 [ 406.665440][T17156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.665455][T17156] ? __fget+0x384/0x560 [ 406.665471][T17156] ? ksys_dup3+0x3e0/0x3e0 [ 406.665496][T17156] ? __fget_light+0x1a9/0x230 [ 406.675211][T17156] ? __fdget+0x1b/0x20 [ 406.675227][T17156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 406.675249][T17156] __sys_sendmsg+0x105/0x1d0 [ 406.756940][T17156] ? __sys_sendmsg_sock+0xd0/0xd0 [ 406.761996][T17156] ? switch_fpu_return+0x1fa/0x4f0 [ 406.767206][T17156] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 406.773325][T17156] __x64_sys_sendmsg+0x78/0xb0 [ 406.778107][T17156] do_syscall_64+0xfa/0x760 [ 406.782643][T17156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.789104][T17156] RIP: 0033:0x459829 22:14:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB], 0x30}, 0x0) [ 406.793013][T17156] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.813483][T17156] RSP: 002b:00007f09e54c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 406.821919][T17156] RAX: ffffffffffffffda RBX: 00007f09e54c3c90 RCX: 0000000000459829 [ 406.829912][T17156] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000005 [ 406.837899][T17156] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 406.845991][T17156] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09e54c46d4 [ 406.853973][T17156] R13: 00000000004c7743 R14: 00000000004dce88 R15: 0000000000000006 22:14:00 executing program 0 (fault-call:4 fault-nth:5): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:00 executing program 3 (fault-call:2 fault-nth:6): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0xa4ffffff00000000, 0x15, 0x0, &(0x7f00000000c0)) 22:14:00 executing program 4: r0 = socket$inet(0x2, 0x2800080001, 0x84) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000180)={0x1, 0x102, 0x2, {0x1, 0x3, 0x59ef, 0x400000000000}}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000006000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12-simd\x00'}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) 22:14:00 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x4000) write$UHID_INPUT(r0, &(0x7f0000000200)={0x8, "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", 0x1000}, 0x1006) socketpair$unix(0x1, 0x100000000006, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x259fa167) flistxattr(r1, 0x0, 0xfffffffffffffe0c) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000040)={0x4003, 0xffff, 0x9, 0x100}) 22:14:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/12], 0x3c}, 0x0) [ 407.017426][T17266] FAULT_INJECTION: forcing a failure. [ 407.017426][T17266] name failslab, interval 1, probability 0, space 0, times 0 [ 407.020124][T17269] FAULT_INJECTION: forcing a failure. [ 407.020124][T17269] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 407.043455][T17269] CPU: 0 PID: 17269 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190801 #57 [ 407.052565][T17269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.062629][T17269] Call Trace: [ 407.065932][T17269] dump_stack+0x172/0x1f0 [ 407.070274][T17269] should_fail.cold+0xa/0x15 [ 407.074866][T17269] ? fault_create_debugfs_attr+0x180/0x180 [ 407.080693][T17269] ? is_bpf_text_address+0xac/0x170 [ 407.085932][T17269] ? __kasan_check_read+0x11/0x20 [ 407.090983][T17269] should_fail_alloc_page+0x50/0x60 [ 407.096195][T17269] __alloc_pages_nodemask+0x1a1/0x900 [ 407.101574][T17269] ? __bpf_address_lookup+0x310/0x310 [ 407.106966][T17269] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 407.112697][T17269] ? __alloc_pages_slowpath+0x2520/0x2520 [ 407.118426][T17269] ? kernel_text_address+0x73/0xf0 [ 407.123546][T17269] ? fault_create_debugfs_attr+0x180/0x180 [ 407.129363][T17269] cache_grow_begin+0x90/0xd20 [ 407.134160][T17269] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 407.139894][T17269] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.146138][T17269] __kmalloc+0x6b2/0x770 [ 407.150379][T17269] ? mark_held_locks+0xf0/0xf0 [ 407.155149][T17269] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 407.160902][T17269] tomoyo_realpath_from_path+0xcd/0x7b0 [ 407.166457][T17269] ? tomoyo_path_perm+0x1cb/0x430 [ 407.171493][T17269] tomoyo_path_perm+0x230/0x430 [ 407.176346][T17269] ? tomoyo_path_perm+0x1cb/0x430 [ 407.181375][T17269] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 407.187445][T17269] ? __fget+0x35d/0x560 [ 407.191607][T17269] ? __kasan_check_read+0x11/0x20 [ 407.196638][T17269] ? __fget+0xa3/0x560 [ 407.200729][T17269] ? lock_acquire+0x190/0x410 [ 407.205415][T17269] ? do_sys_ftruncate+0x282/0x550 [ 407.210449][T17269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.216710][T17269] tomoyo_path_truncate+0x1d/0x30 [ 407.221748][T17269] security_path_truncate+0xf2/0x150 [ 407.227039][T17269] do_sys_ftruncate+0x3d9/0x550 [ 407.231896][T17269] __x64_sys_ftruncate+0x59/0x80 [ 407.236840][T17269] do_syscall_64+0xfa/0x760 [ 407.241359][T17269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.247350][T17269] RIP: 0033:0x4597f7 [ 407.251252][T17269] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.270864][T17269] RSP: 002b:00007f0bba52aa88 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 407.280339][T17269] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 407.288347][T17269] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000006 [ 407.296425][T17269] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 407.304410][T17269] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000006 [ 407.312390][T17269] R13: 00000000004c89bb R14: 00000000004df7e0 R15: 0000000000000005 [ 407.322463][T17266] CPU: 1 PID: 17266 Comm: syz-executor.0 Not tainted 5.3.0-rc2-next-20190801 #57 [ 407.331588][T17266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.341655][T17266] Call Trace: [ 407.344961][T17266] dump_stack+0x172/0x1f0 [ 407.349308][T17266] should_fail.cold+0xa/0x15 [ 407.353914][T17266] ? __kasan_check_read+0x11/0x20 [ 407.358956][T17266] ? fault_create_debugfs_attr+0x180/0x180 [ 407.358974][T17266] ? sk_filter_trim_cap+0x433/0xb30 [ 407.358996][T17266] ? __kasan_check_read+0x11/0x20 [ 407.370007][T17266] __should_failslab+0x121/0x190 [ 407.370024][T17266] should_failslab+0x9/0x14 [ 407.370044][T17266] kmem_cache_alloc+0x47/0x710 [ 407.384486][T17266] ? lock_acquire+0x190/0x410 [ 407.384502][T17266] ? netlink_deliver_tap+0x146/0xbf0 [ 407.384524][T17266] skb_clone+0x154/0x3d0 [ 407.393949][T17266] netlink_deliver_tap+0x94d/0xbf0 [ 407.393967][T17266] __netlink_sendskb+0x62/0xc0 [ 407.393981][T17266] netlink_unicast+0x60a/0x710 [ 407.393995][T17266] ? netlink_attachskb+0x7c0/0x7c0 [ 407.394012][T17266] netlink_ack+0x63f/0xb30 [ 407.394032][T17266] ? netlink_sendmsg+0xd60/0xd60 [ 407.432607][T17266] ? __copy_skb_header+0x270/0x550 [ 407.437745][T17266] netlink_rcv_skb+0x376/0x450 [ 407.443145][T17266] ? rtnetlink_put_metrics+0x580/0x580 [ 407.448635][T17266] ? netlink_ack+0xb30/0xb30 [ 407.453246][T17266] ? netlink_deliver_tap+0x254/0xbf0 [ 407.458554][T17266] rtnetlink_rcv+0x1d/0x30 [ 407.462991][T17266] netlink_unicast+0x531/0x710 [ 407.468274][T17266] ? netlink_attachskb+0x7c0/0x7c0 [ 407.473404][T17266] ? _copy_from_iter_full+0x25d/0x8a0 [ 407.478795][T17266] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 407.484539][T17266] ? __check_object_size+0x3d/0x43c [ 407.489776][T17266] netlink_sendmsg+0x8a5/0xd60 [ 407.494571][T17266] ? netlink_unicast+0x710/0x710 [ 407.499523][T17266] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 407.505085][T17266] ? apparmor_socket_sendmsg+0x2a/0x30 [ 407.510555][T17266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.516811][T17266] ? security_socket_sendmsg+0x8d/0xc0 [ 407.522278][T17266] ? netlink_unicast+0x710/0x710 [ 407.527227][T17266] sock_sendmsg+0xd7/0x130 [ 407.531657][T17266] ___sys_sendmsg+0x803/0x920 [ 407.536354][T17266] ? copy_msghdr_from_user+0x440/0x440 [ 407.541906][T17266] ? __fget+0xa3/0x560 [ 407.545983][T17266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.552231][T17266] ? __fget+0x384/0x560 [ 407.556400][T17266] ? ksys_dup3+0x3e0/0x3e0 [ 407.560828][T17266] ? __fget_light+0x1a9/0x230 [ 407.565516][T17266] ? __fdget+0x1b/0x20 [ 407.569594][T17266] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.575846][T17266] __sys_sendmsg+0x105/0x1d0 [ 407.580462][T17266] ? __sys_sendmsg_sock+0xd0/0xd0 [ 407.585509][T17266] ? switch_fpu_return+0x1fa/0x4f0 [ 407.590636][T17266] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 407.596711][T17266] __x64_sys_sendmsg+0x78/0xb0 [ 407.601492][T17266] do_syscall_64+0xfa/0x760 [ 407.606005][T17266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.611900][T17266] RIP: 0033:0x459829 [ 407.615806][T17266] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.635418][T17266] RSP: 002b:00007f09e54c3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 407.643873][T17266] RAX: ffffffffffffffda RBX: 00007f09e54c3c90 RCX: 0000000000459829 [ 407.651964][T17266] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000005 [ 407.659948][T17266] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:14:01 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x8040, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000500)=""/205) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) execveat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='ppp1\x00', &(0x7f0000000180)='vmnet1\'($)\x00', &(0x7f0000000200)='keyring&--(\x00', &(0x7f0000000240)='wlan1/@selinux-posix_acl_access\xf5wlan0]}ppp1em1\'{\x00', &(0x7f0000000280)='\x00'], &(0x7f0000000340)=[&(0x7f0000000300)='GPLem0wlan0}md5sum}&$+vmnet0}\x00'], 0x1800) flistxattr(0xffffffffffffffff, 0x0, 0xfffffffffffffe1d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) getpeername$ax25(r2, &(0x7f0000000380)={{}, [@null, @netrom, @default, @bcast, @bcast, @default, @bcast, @netrom]}, &(0x7f0000000400)=0x48) getsockname$unix(r1, &(0x7f0000000480)=@abs, &(0x7f0000000440)=0x6e) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x3, 0x4) epoll_create1(0x80000) 22:14:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x2, 0x0, &(0x7f00000000c0)) [ 407.667927][T17266] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09e54c46d4 [ 407.675907][T17266] R13: 00000000004c7743 R14: 00000000004dce88 R15: 0000000000000006 22:14:01 executing program 0 (fault-call:4 fault-nth:6): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/12], 0x3c}, 0x0) 22:14:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x3, 0x0, &(0x7f00000000c0)) [ 407.719566][T17269] hfsplus: type requires a 4 character value [ 407.746415][T17269] hfsplus: unable to parse mount options [ 407.765575][T17384] QAT: Invalid ioctl 22:14:01 executing program 4: r0 = socket$inet(0x2, 0x2800080001, 0x84) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000180)={0x1, 0x102, 0x2, {0x1, 0x3, 0x59ef, 0x400000000000}}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000006000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12-simd\x00'}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r2}) [ 407.816295][T17384] QAT: Invalid ioctl 22:14:01 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:01 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/12], 0x3c}, 0x0) 22:14:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x4, 0x0, &(0x7f00000000c0)) 22:14:01 executing program 4: r0 = socket$inet(0x2, 0x2800080001, 0x84) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000180)={0x1, 0x102, 0x2, {0x1, 0x3, 0x59ef, 0x400000000000}}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000006000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12-simd\x00'}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r2}) 22:14:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 408.022333][T17495] hfsplus: type requires a 4 character value 22:14:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/18], 0x42}, 0x0) [ 408.082061][T17495] hfsplus: unable to parse mount options 22:14:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x6, 0x0, &(0x7f00000000c0)) 22:14:01 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0x80) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:01 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='\nfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/18], 0x42}, 0x0) 22:14:01 executing program 4: r0 = socket$inet(0x2, 0x2800080001, 0x84) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000180)={0x1, 0x102, 0x2, {0x1, 0x3, 0x59ef, 0x400000000000}}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000006000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha12-simd\x00'}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r2}) 22:14:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x7, 0x0, &(0x7f00000000c0)) 22:14:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/18], 0x42}, 0x0) 22:14:01 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) signalfd(r0, &(0x7f0000000080)={0x29f1}, 0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xc0000, 0x0) bind$tipc(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r1, r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="30ead1ad4b6c000400000001000000a1998aa84ede053a9d"], 0x1}}, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000580)={0x3, 0x0, 0x3}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000002c0)={0x7b0b}, 0x4) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r6, 0xae80, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x8, 0x0, &(0x7f00000000c0)) 22:14:01 executing program 4: r0 = socket$inet(0x2, 0x2800080001, 0x84) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000180)={0x1, 0x102, 0x2, {0x1, 0x3, 0x59ef, 0x400000000000}}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r3}) 22:14:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/21], 0x45}, 0x0) 22:14:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='%fsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/21], 0x45}, 0x0) 22:14:02 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x9, 0x0, &(0x7f00000000c0)) 22:14:02 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/21], 0x45}, 0x0) 22:14:02 executing program 4: socket$inet(0x2, 0x2800080001, 0x84) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000180)={0x1, 0x102, 0x2, {0x1, 0x3, 0x59ef, 0x400000000000}}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r2}) 22:14:02 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0xa, 0x0, &(0x7f00000000c0)) 22:14:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='\\fsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:02 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) flistxattr(0xffffffffffffffff, 0x0, 0x364) 22:14:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/23], 0x47}, 0x0) 22:14:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:02 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0xb, 0x0, &(0x7f00000000c0)) 22:14:02 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x5, 0x2) 22:14:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/23], 0x47}, 0x0) 22:14:02 executing program 4: socket$inet(0x2, 0x2800080001, 0x84) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='h\nsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:02 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0xc, 0x0, &(0x7f00000000c0)) 22:14:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB], @ANYBLOB="0100"/23], 0x47}, 0x0) 22:14:02 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:02 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0xd, 0x0, &(0x7f00000000c0)) 22:14:02 executing program 4: socket$inet(0x2, 0x2800080001, 0x84) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYBLOB="0100"/24], 0x40}, 0x0) 22:14:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x8, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:02 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x28000, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x8) 22:14:02 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0xe, 0x0, &(0x7f00000000c0)) 22:14:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYBLOB="0100"/24], 0x40}, 0x0) 22:14:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='h%splus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:03 executing program 4: socket$inet(0x2, 0x2800080001, 0x84) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0xf, 0x0, &(0x7f00000000c0)) [ 409.657528][T19311] QAT: Invalid ioctl 22:14:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYBLOB="0100"/24], 0x40}, 0x0) 22:14:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x12, 0x0, &(0x7f00000000c0)) 22:14:03 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0xc0800, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000100)={0xffff, "e74da17c51558e84fb167c62ffd8de1df21757d1453117464ec3a4c5a4a336ec", 0x3, 0x3, 0x9, 0xff06ff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000200)={0x6, "041a2203dff0dcb0584e8c5fc8f60bc4c7e2ade8b1dd603f54e8d8526681439d", 0x3, 0x5, 0x4, 0x400, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285629, &(0x7f0000000080)={0x0, 0x12, 0x9, [], &(0x7f0000000040)=0x21f}) 22:14:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:03 executing program 4: socket$inet(0x2, 0x2800080001, 0x84) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xa, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:03 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='h.splus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x13, 0x0, &(0x7f00000000c0)) 22:14:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xb, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:03 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) shutdown(r0, 0x1) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000080)=r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$TUNSETLINK(r4, 0x400454cd, 0x7) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x14, 0x0, &(0x7f00000000c0)) 22:14:03 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:03 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='h/splus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x16, 0x0, &(0x7f00000000c0)) 22:14:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:03 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'team_slave_1\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x200, 0x0) connect$pptp(r2, &(0x7f0000000100)={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x28, 0x402000) bind$llc(r3, &(0x7f0000000080)={0x1a, 0xffff, 0x0, 0x500, 0x80000001, 0x7, @link_local}, 0x10) 22:14:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x17, 0x0, &(0x7f00000000c0)) 22:14:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x18, 0x0, &(0x7f00000000c0)) 22:14:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xe, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:03 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x131140, 0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001a00)='IPVS\x00') lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x5, &(0x7f0000001480)=[{&(0x7f00000002c0)="9c3aa9490dac39a174c3fe156932c94c277eff76f83ee407e8a6ad44a845c614d5614d1c5147ffc647771fac60a780fd6e167c335efe5bf5ce164efae477b744e746ab2194d8c5f54a215dbc91b5f5204c1a6076b2ed14eda32cabf5829d06f4ef38a6cf579c07b56a7d0dc660a438bd83b28fb434a478d2d2ce381a1e2d9a784b9508ab93febea018414e2b3e1c3a6ed7", 0x91, 0x2}, {&(0x7f0000000380)="c6a7d7a426874d6d92400efe49a61bda263d9f07b883cb1d0331d77236a68d249cbc7865517d6d54c05bdd4ba2942bf6ffe109b3cff9b57d774af7ada5337971cbaea1c0", 0x44, 0x4}, {&(0x7f0000000080)="808f587abf12cb63", 0x8, 0x800}, {&(0x7f0000000400)="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", 0x1000, 0xfffffffffffffffd}, {&(0x7f0000001400)="d6031168c000885e1cb1a5e051e8c0b7616930ae26c83c70c0c62f559da8f7f44f7cd24060563bc7207da55a24b76097d5184506a6ce87c15b396f0069c375fdba6b560b78e72b4033b7ec94ea0ad108dfb17466777f82d4809424da24631abdd54753819fb6c6a158", 0x69, 0x19b}], 0x60000, &(0x7f0000001740)={[{@iocharset={'iocharset', 0x3d, 'iso8859-5'}}], [{@fowner_lt={'fowner<', r3}}, {@measure='measure'}, {@uid_lt={'uid<', r4}}, {@subj_user={'subj_user', 0x3d, 'IPVS\x00'}}, {@uid_eq={'uid', 0x3d, r5}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}]}) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x80, r2, 0x304, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x21}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:03 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='h\\splus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:03 executing program 4: r0 = syz_open_dev$mice(0x0, 0x0, 0x26c02) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x19, 0x0, &(0x7f00000000c0)) 22:14:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:04 executing program 4: r0 = syz_open_dev$mice(0x0, 0x0, 0x26c02) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x21, 0x0, &(0x7f00000000c0)) 22:14:04 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hf\nplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:04 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) fanotify_init(0x0, 0x2) 22:14:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100000000000000", @ANYPTR, @ANYBLOB="0100"/24], 0x34}, 0x0) 22:14:04 executing program 4: r0 = syz_open_dev$mice(0x0, 0x0, 0x26c02) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x22, 0x0, &(0x7f00000000c0)) 22:14:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite6\x00') ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000200)={0xf, 0x5, 0x4, 0x80000}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0xca, "f6dfd102073a55b052a97a1845ec855f905b2a8eddc4e4e3e7659b856e781fe4f14ab317863435d739fb34f368ddfe080306669287cbb7e9e0db4cea6756de09f3aad7725895d37560a7dcf8f52e34c48cd6678107a28c8cd246b774f1fae49f10fa0b77dabd43941579bcb61f52254911a9ca5581c4214cf776cfb0fd4f4f6fef80f0822e4973b161c6394a0de254d75908bdcc537c0a4a8365093cb90b31ea76fe58d3e351fa39f51e4a8574fee9501b2482b1eaaf040ce5fef117734901e8840b0a72d7c69cad0826"}, &(0x7f0000000140)=0xd2) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r1, 0x1}, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_ima(r2, &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="9fa4d9d1"], 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100000000000000", @ANYPTR, @ANYBLOB="0100"/24], 0x34}, 0x0) 22:14:04 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x29, 0x0, &(0x7f00000000c0)) 22:14:04 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hf#plus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100000000000000", @ANYPTR, @ANYBLOB="0100"/24], 0x34}, 0x0) 22:14:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x30, 0x0, &(0x7f00000000c0)) 22:14:04 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x202000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r1, 0x1, 0x1, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x4000000000000166}, 0x20) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000080)=0x4) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) 22:14:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x11, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:04 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:04 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hf%plus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:04 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x31, 0x0, &(0x7f00000000c0)) 22:14:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/30, @ANYPTR, @ANYBLOB="0100"/24], 0x3e}, 0x0) 22:14:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x32, 0x0, &(0x7f00000000c0)) 22:14:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/30, @ANYPTR, @ANYBLOB="0100"/24], 0x3e}, 0x0) 22:14:05 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x13, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hf*plus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/30, @ANYPTR, @ANYBLOB="0100"/24], 0x3e}, 0x0) 22:14:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0x84) 22:14:05 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r1 = syz_open_dev$mice(0x0, 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x14, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/35, @ANYPTR, @ANYBLOB="0100"/24], 0x43}, 0x0) 22:14:05 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) mq_unlink(&(0x7f0000000040)='/proc/capi/capi20ncci\x00') syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x50, 0x20000) 22:14:05 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r1 = syz_open_dev$mice(0x0, 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0x8400) 22:14:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hf+plus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/35, @ANYPTR, @ANYBLOB="0100"/24], 0x43}, 0x0) 22:14:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0x1000000) 22:14:05 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0xffffffffffffff00) 22:14:05 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r1 = syz_open_dev$mice(0x0, 0x0, 0x40000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/35, @ANYPTR, @ANYBLOB="0100"/24], 0x43}, 0x0) 22:14:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0x84000000) 22:14:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0xffffffffffffff9f) 22:14:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/38, @ANYPTR, @ANYBLOB="0100"/24], 0x46}, 0x0) 22:14:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hf-plus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:05 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r1}) 22:14:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0xa4ffffff) 22:14:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/38, @ANYPTR, @ANYBLOB="0100"/24], 0x46}, 0x0) 22:14:06 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) process_vm_writev(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/181, 0xb5}, {&(0x7f0000000200)=""/200, 0xc8}], 0x2, &(0x7f0000000540)=[{&(0x7f0000000300)=""/158, 0x9e}, {&(0x7f00000003c0)=""/167, 0xa7}, {&(0x7f0000000480)=""/166, 0xa6}, {&(0x7f0000000140)=""/93, 0x5d}], 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0xffffffa4) 22:14:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/38, @ANYPTR, @ANYBLOB="0100"/24], 0x46}, 0x0) 22:14:06 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r0}) 22:14:06 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0xb86, 0x10}, 0xc) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) epoll_create1(0x80000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000100)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x50401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xfff) flistxattr(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 22:14:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0x7ffffffff000) 22:14:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hf.plus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/39, @ANYPTR, @ANYBLOB="0100"/24], 0x47}, 0x0) 22:14:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0xf0ffffff7f0000) 22:14:06 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000100)={0x0, 0x1, 0x401, 0x80000, r0}) 22:14:06 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x0, 0x0, @in={0x2, 0x4e24, @empty}}}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/39, @ANYPTR, @ANYBLOB="0100"/24], 0x47}, 0x0) 22:14:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hf/plus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0x100000000000000) 22:14:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/39, @ANYPTR, @ANYBLOB="0100"/24], 0x47}, 0x0) 22:14:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x900, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x100) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000040)=0x5, 0x4) 22:14:06 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0x8400000000000000) 22:14:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hf0plus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:06 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xa00, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0xa4ffffff00000000) 22:14:06 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:07 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x5, 0x8000f, 0x100000001) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x1c0, r2, 0xb00, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffff800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffff12}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5bf4c8e5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xba}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) 22:14:07 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfXplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xb00, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:07 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x15, 0x0, &(0x7f00000000c0)) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x1c, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0xa098}, &(0x7f0000000100)=0x8) socket$rxrpc(0x21, 0x2, 0xa) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000140)=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.events\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f00000001c0)={0x3, 0x1ff}) 22:14:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:07 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r1 = shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x2000) shmdt(r1) 22:14:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xc00, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:07 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000180)=0x9) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:pinentry_exec_t:s0\x00', 0x25, 0x2) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:07 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hf\\plus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xe00, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200240, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = socket$inet(0x2, 0x5, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x6, 0x900) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000140)={0x3d6, 0x0, [], {0x0, @reserved}}) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 22:14:07 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:07 executing program 4 (fault-call:1 fault-nth:0): syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:07 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x2, 0x0) sendto$isdn(r0, &(0x7f0000000140)={0x7fff, 0x1f, "38af4fbca11676b35aa7f93b02b7d6139c2a934a821205ce12de07e33c208768eb7a4725a95f8c9b1dc0c511e2ffa771b4a95fd6049fe55fb2206907cfab5834482181baf7b021a2b7f8f84d707a732ddd0b386dc733447a1fce8f9ae8e45385d699aad7245ced38a6a7bf39cc5af392d18bd1494a2711e5ae6ed757adbe9394f54ee9e3280d376af24e027db830a8bc3398ae64a9584ba1fd4a7152a60d21bbffd532ea8b8eb3a67f17a3a55b9dd32ac679a74fd61f686f3ce15e84e680fc5dc342338c801e775927207edf62b64ddfc453dbf0eeaf4725aa7d381844b1c73bfc"}, 0xe9, 0x20000801, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSTATFS(r0, &(0x7f00000004c0)={0x43, 0x9, 0x1, {0x9, 0x0, 0x144, 0x10001, 0xc57, 0x4, 0xffffffff, 0x3, 0x40}}, 0x43) syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7, 0x7f, 0x1}, 0x7) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) r3 = geteuid() prctl$PR_MCE_KILL_GET(0x22) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000080)=0x7fff) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000340)=[{&(0x7f0000000280)="75988a8426e19c8ac37b66b468be5989a234ea0da10f474ad68791058e1d0149d29c78dbe9420d0f78786b75d134d3024c54b5df", 0x34, 0x4}, {&(0x7f00000002c0)="a18728757aa425f516318eefa0227237f536b8d778a0c6c3ca72890368abe4e9dd894f1060e1a247fd61f36d3d3279b5b8f46371d5b36e07a60164f1f1b9da4c69faff968a9a8078a3c46a801256e4e0ea2a59c8ad5084fd77269e918cb2fda1a58628b4c65f96103c5c0e3920d13423b40f373eeac4ea50cce7799ccd7f", 0x7e, 0x80000001}], 0x2000, &(0x7f0000000380)=ANY=[@ANYBLOB='no\b\x00\x00\x00\x00\x00\x00\x00ner=', @ANYRESDEC=r3, @ANYBLOB=',obj_user=/dev/vcs\x00,appraise,\x00']) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x400800, 0x0) [ 414.098601][T24901] Unknown ioctl 35090 22:14:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf00, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) [ 414.151702][T25040] FAULT_INJECTION: forcing a failure. [ 414.151702][T25040] name failslab, interval 1, probability 0, space 0, times 0 [ 414.211155][T25040] CPU: 0 PID: 25040 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190801 #57 [ 414.220313][T25040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.230369][T25040] Call Trace: [ 414.233678][T25040] dump_stack+0x172/0x1f0 [ 414.238026][T25040] should_fail.cold+0xa/0x15 [ 414.242627][T25040] ? fault_create_debugfs_attr+0x180/0x180 [ 414.248543][T25040] ? page_to_nid.part.0+0x20/0x20 [ 414.253580][T25040] ? ___might_sleep+0x163/0x280 [ 414.258444][T25040] __should_failslab+0x121/0x190 [ 414.263389][T25040] should_failslab+0x9/0x14 [ 414.267900][T25040] kmem_cache_alloc+0x2aa/0x710 [ 414.267914][T25040] ? __kasan_check_write+0x14/0x20 [ 414.267938][T25040] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 414.283468][T25040] getname_flags+0xd6/0x5b0 [ 414.287995][T25040] getname+0x1a/0x20 [ 414.288012][T25040] do_sys_open+0x2c9/0x5d0 [ 414.288033][T25040] ? filp_open+0x80/0x80 [ 414.300561][T25040] ? switch_fpu_return+0x1fa/0x4f0 [ 414.305684][T25040] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 414.311782][T25040] __x64_sys_open+0x7e/0xc0 [ 414.316659][T25040] do_syscall_64+0xfa/0x760 [ 414.323712][T25040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.329612][T25040] RIP: 0033:0x413711 [ 414.333514][T25040] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 22:14:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1100, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:07 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfcplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:07 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xc0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) flistxattr(0xffffffffffffffff, 0x0, 0x0) [ 414.353132][T25040] RSP: 002b:00007f79a514a7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 414.364017][T25040] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 [ 414.372001][T25040] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f79a514a850 [ 414.380073][T25040] RBP: 000000000075bfc8 R08: 000000000000000f R09: 0000000000000000 [ 414.388067][T25040] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f79a514b6d4 [ 414.396064][T25040] R13: 00000000004c8c67 R14: 00000000004dfaf8 R15: 0000000000000003 22:14:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1, 0x9, 0x4, 0x5000000000, 0x3}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x6}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x101, 0x4}, 0x8) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f0000000240)=0x5a) 22:14:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x48) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0x47598b99f0b478f7) 22:14:08 executing program 4 (fault-call:1 fault-nth:1): syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1200, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:08 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(r0, 0x0, 0x0) 22:14:08 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfdplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x98) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r1) 22:14:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) [ 414.760337][T25709] FAULT_INJECTION: forcing a failure. [ 414.760337][T25709] name failslab, interval 1, probability 0, space 0, times 0 22:14:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1300, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 414.803937][T25709] CPU: 0 PID: 25709 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190801 #57 [ 414.813100][T25709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.823172][T25709] Call Trace: [ 414.823203][T25709] dump_stack+0x172/0x1f0 [ 414.823223][T25709] should_fail.cold+0xa/0x15 [ 414.823240][T25709] ? is_bpf_text_address+0xd3/0x170 [ 414.823264][T25709] ? fault_create_debugfs_attr+0x180/0x180 [ 414.846492][T25709] ? page_to_nid.part.0+0x20/0x20 [ 414.851521][T25709] ? ___might_sleep+0x163/0x280 [ 414.856378][T25709] __should_failslab+0x121/0x190 [ 414.861323][T25709] should_failslab+0x9/0x14 [ 414.865832][T25709] kmem_cache_alloc+0x2aa/0x710 [ 414.870705][T25709] ? stack_trace_save+0xac/0xe0 [ 414.875565][T25709] ? stack_trace_consume_entry+0x190/0x190 [ 414.881374][T25709] __alloc_file+0x27/0x340 [ 414.885818][T25709] alloc_empty_file+0x72/0x170 [ 414.890630][T25709] path_openat+0xef/0x4630 [ 414.895065][T25709] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 414.900963][T25709] ? kasan_slab_alloc+0xf/0x20 [ 414.905719][T25709] ? kmem_cache_alloc+0x121/0x710 [ 414.910736][T25709] ? getname_flags+0xd6/0x5b0 [ 414.915408][T25709] ? getname+0x1a/0x20 [ 414.919471][T25709] ? do_sys_open+0x2c9/0x5d0 [ 414.924074][T25709] ? __x64_sys_open+0x7e/0xc0 [ 414.928751][T25709] ? do_syscall_64+0xfa/0x760 [ 414.933457][T25709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.939537][T25709] ? lock_downgrade+0x920/0x920 [ 414.944405][T25709] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 414.950134][T25709] ? kstrtouint+0x142/0x1a0 [ 414.955173][T25709] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 414.960554][T25709] ? _kstrtoul+0x170/0x170 [ 414.964994][T25709] ? get_pid_task+0xc9/0x190 [ 414.969583][T25709] ? __kasan_check_read+0x11/0x20 [ 414.974617][T25709] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 414.980246][T25709] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 414.985985][T25709] do_filp_open+0x1a1/0x280 [ 414.990485][T25709] ? may_open_dev+0x100/0x100 [ 414.995172][T25709] ? lock_downgrade+0x920/0x920 [ 415.000031][T25709] ? rwlock_bug.part.0+0x90/0x90 [ 415.004985][T25709] ? __alloc_fd+0x35/0x620 [ 415.009502][T25709] ? __kasan_check_read+0x11/0x20 [ 415.014525][T25709] ? do_raw_spin_unlock+0x57/0x270 [ 415.019645][T25709] ? _raw_spin_unlock+0x2d/0x50 [ 415.024512][T25709] ? __alloc_fd+0x487/0x620 [ 415.029046][T25709] do_sys_open+0x3fe/0x5d0 [ 415.033491][T25709] ? filp_open+0x80/0x80 [ 415.037739][T25709] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 415.043805][T25709] __x64_sys_open+0x7e/0xc0 [ 415.048305][T25709] do_syscall_64+0xfa/0x760 [ 415.052806][T25709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.058685][T25709] RIP: 0033:0x413711 [ 415.062574][T25709] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 415.082194][T25709] RSP: 002b:00007f79a514a7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 415.090716][T25709] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 [ 415.098688][T25709] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f79a514a850 [ 415.106647][T25709] RBP: 000000000075bfc8 R08: 000000000000000f R09: 0000000000000000 [ 415.114608][T25709] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f79a514b6d4 [ 415.122567][T25709] R13: 00000000004c8c67 R14: 00000000004dfaf8 R15: 0000000000000003 22:14:08 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000140)=0x1ff, &(0x7f0000000180)=0x4) bind(r0, &(0x7f00000000c0)=@nl=@unspec, 0x80) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x80000, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x80) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000040)='-)\x00', 0x3b516e3da22f6dc7) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) flistxattr(r1, 0x0, 0x372) bind(r0, &(0x7f0000000240)=@ax25={{0x3, @null, 0x8}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 22:14:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:08 executing program 4 (fault-call:1 fault-nth:2): syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:08 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfiplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:08 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1400, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:08 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="00815501", @ANYRES16=r3, @ANYBLOB="08022abd7000fbdbdf25090000000c0001000800090066000000"], 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x404c8c5) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:08 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x480, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000100)={0x5, 0x7}, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pipe2(&(0x7f0000000080), 0x84000) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000200)={{0x2, 0x1, 0x8, 0x7}, 0x0, [0x80000000, 0xd181e29, 0x7, 0x8000, 0x1, 0x10001, 0x8, 0x2, 0xfff, 0xff, 0x40, 0x7, 0xe460, 0x6, 0x6, 0x868, 0xb08, 0x7, 0x6, 0x7, 0x4, 0x3, 0x0, 0x6, 0x1, 0xffffffff, 0x0, 0x9, 0x3, 0x1, 0x785c, 0xf78, 0x4, 0x2, 0x2, 0x7fffffff, 0x3, 0x2, 0x40, 0x4, 0x800, 0x800, 0x16, 0x2, 0x3, 0x8, 0x400, 0x1000, 0x4c36, 0x7f, 0x1, 0x80000001, 0x10000, 0x4, 0xffffffff00000001, 0x101, 0x1, 0x1, 0x0, 0x20, 0x49, 0xb74, 0x401, 0x8, 0x7, 0x40, 0x8, 0x7, 0xffffffffffffffb2, 0x1, 0x4, 0xfffffffffffffff9, 0x7, 0xd03d, 0x5, 0x20, 0x8, 0x4, 0x5, 0x4, 0x8001, 0xfffffffffffffffa, 0x1, 0x9, 0x6, 0x8001, 0x6264, 0x0, 0x9, 0x3, 0x7, 0x3ff, 0x1, 0x7fffffff, 0x3, 0x40, 0x8, 0x400, 0x3ff, 0x0, 0x7, 0x4, 0x37b0, 0x8, 0x80000000, 0x0, 0x82, 0x8967, 0x2, 0x2, 0xff, 0x3, 0x6, 0x6, 0xfffffffffffffffa, 0xd33, 0x50, 0x200, 0x4, 0x0, 0x3, 0x8000, 0x0, 0x9, 0xe5, 0x7f, 0x1, 0x2], {r3, r4+10000000}}) flistxattr(r2, 0x0, 0xfffffffffffffd29) 22:14:08 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) [ 415.456009][T26108] FAULT_INJECTION: forcing a failure. [ 415.456009][T26108] name failslab, interval 1, probability 0, space 0, times 0 22:14:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 22:14:08 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:08 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hflplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) [ 415.593541][T26108] CPU: 0 PID: 26108 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190801 #57 [ 415.602939][T26108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.613013][T26108] Call Trace: [ 415.616363][T26108] dump_stack+0x172/0x1f0 [ 415.620722][T26108] should_fail.cold+0xa/0x15 [ 415.625344][T26108] ? is_bpf_text_address+0xd3/0x170 [ 415.630570][T26108] ? fault_create_debugfs_attr+0x180/0x180 [ 415.636393][T26108] ? page_to_nid.part.0+0x20/0x20 [ 415.641433][T26108] ? ___might_sleep+0x163/0x280 [ 415.646299][T26108] __should_failslab+0x121/0x190 [ 415.651244][T26108] should_failslab+0x9/0x14 [ 415.655753][T26108] kmem_cache_alloc+0x2aa/0x710 [ 415.660617][T26108] ? stack_trace_save+0xac/0xe0 [ 415.665479][T26108] ? stack_trace_consume_entry+0x190/0x190 [ 415.671383][T26108] __alloc_file+0x27/0x340 [ 415.675819][T26108] alloc_empty_file+0x72/0x170 [ 415.680609][T26108] path_openat+0xef/0x4630 [ 415.685129][T26108] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 415.690965][T26108] ? kasan_slab_alloc+0xf/0x20 [ 415.695760][T26108] ? kmem_cache_alloc+0x121/0x710 [ 415.695776][T26108] ? getname_flags+0xd6/0x5b0 [ 415.695796][T26108] ? getname+0x1a/0x20 [ 415.709541][T26108] ? do_sys_open+0x2c9/0x5d0 [ 415.709556][T26108] ? __x64_sys_open+0x7e/0xc0 [ 415.709572][T26108] ? do_syscall_64+0xfa/0x760 [ 415.709595][T26108] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.723505][T26108] ? __isolate_free_page+0x4c0/0x4c0 [ 415.723520][T26108] ? __kasan_check_read+0x11/0x20 [ 415.723537][T26108] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 415.723549][T26108] ? __kasan_check_read+0x11/0x20 [ 415.723561][T26108] ? __alloc_pages_nodemask+0x578/0x900 [ 415.723580][T26108] ? cache_grow_end+0xa4/0x190 [ 415.739937][T26108] ? __kasan_check_read+0x11/0x20 [ 415.739962][T26108] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 415.739984][T26108] do_filp_open+0x1a1/0x280 [ 415.751384][T26108] ? may_open_dev+0x100/0x100 [ 415.751401][T26108] ? lock_downgrade+0x920/0x920 [ 415.751414][T26108] ? rwlock_bug.part.0+0x90/0x90 [ 415.751426][T26108] ? __alloc_fd+0x35/0x620 [ 415.751440][T26108] ? __kasan_check_read+0x11/0x20 [ 415.751452][T26108] ? do_raw_spin_unlock+0x57/0x270 [ 415.751482][T26108] ? _raw_spin_unlock+0x2d/0x50 [ 415.761815][T26108] ? __alloc_fd+0x487/0x620 [ 415.761839][T26108] do_sys_open+0x3fe/0x5d0 [ 415.761855][T26108] ? filp_open+0x80/0x80 [ 415.761871][T26108] ? switch_fpu_return+0x1fa/0x4f0 [ 415.761888][T26108] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 415.761910][T26108] __x64_sys_open+0x7e/0xc0 [ 415.786738][T26108] do_syscall_64+0xfa/0x760 22:14:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xf8, 0x400000) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000040)={0x2, 0x1, 0xfffffffffffffe00}) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) [ 415.801074][T26108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.801086][T26108] RIP: 0033:0x413711 [ 415.801101][T26108] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 415.801108][T26108] RSP: 002b:00007f79a514a7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 415.801128][T26108] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 [ 415.839856][T26108] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f79a514a850 [ 415.839865][T26108] RBP: 000000000075bfc8 R08: 000000000000000f R09: 0000000000000000 [ 415.839873][T26108] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f79a514b6d4 [ 415.839888][T26108] R13: 00000000004c8c67 R14: 00000000004dfaf8 R15: 0000000000000003 22:14:09 executing program 4 (fault-call:1 fault-nth:3): syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x156f, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:09 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:09 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = socket$inet(0x2, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x121102, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000080)={0x8, 0x6}) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000140)=""/17) sendto$isdn(r1, &(0x7f0000000180)={0x6, 0x8, "54feedbcf4dfe3a5c48a1a161d759eedf9b57971c5f917371b683c8bce19dc63daf28ef38f839084da3921df10f11cfc1fbe4c8e9288f644a728da96bbe7d7e8e0893f305813134780537aaeb737e6e9d6454bf9dbe64b6c99629efbe94eb5a5aed019e53a2bd653217b7b288cfa456fa3bde0a5146599338ffc0d40b9b3a439676e5f54deb13f7facea8eb66e89bf3934b7474915d30a57a17f7e4072a0cb2893b8a736ae17350383647d4bb850881f69d67682305b218fe05dfcca58f3a2f90ebfde86abf29b50"}, 0xd0, 0x0, &(0x7f0000000040)={0x22, 0x8001, 0x7, 0x40, 0x8}, 0x6) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:09 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfoplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x121000, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x800400200) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200080, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) [ 416.085950][T26676] FAULT_INJECTION: forcing a failure. [ 416.085950][T26676] name failslab, interval 1, probability 0, space 0, times 0 [ 416.144353][T26676] CPU: 0 PID: 26676 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190801 #57 [ 416.153494][T26676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.163651][T26676] Call Trace: [ 416.166973][T26676] dump_stack+0x172/0x1f0 [ 416.171318][T26676] should_fail.cold+0xa/0x15 [ 416.175917][T26676] ? fault_create_debugfs_attr+0x180/0x180 [ 416.181737][T26676] ? kernel_text_address+0x73/0xf0 [ 416.181752][T26676] ? ___might_sleep+0x163/0x280 22:14:09 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) [ 416.181769][T26676] __should_failslab+0x121/0x190 [ 416.181784][T26676] should_failslab+0x9/0x14 [ 416.181795][T26676] __kmalloc+0x2e0/0x770 [ 416.181817][T26676] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 416.191766][T26676] tomoyo_realpath_from_path+0xcd/0x7b0 [ 416.191782][T26676] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 416.191802][T26676] tomoyo_check_open_permission+0x2a8/0x3f0 [ 416.191819][T26676] ? tomoyo_path_number_perm+0x520/0x520 [ 416.191849][T26676] ? lock_downgrade+0x920/0x920 [ 416.191862][T26676] ? rwlock_bug.part.0+0x90/0x90 [ 416.191884][T26676] ? lockref_get+0x16/0x60 [ 416.248807][T26676] tomoyo_file_open+0xa9/0xd0 [ 416.253498][T26676] security_file_open+0x71/0x300 [ 416.258445][T26676] do_dentry_open+0x373/0x1250 [ 416.263226][T26676] ? match_exception_partial+0x242/0x2d0 [ 416.268871][T26676] ? chown_common+0x5c0/0x5c0 [ 416.274074][T26676] ? inode_permission+0xb4/0x560 [ 416.279025][T26676] vfs_open+0xa0/0xd0 [ 416.283026][T26676] path_openat+0x10e9/0x4630 [ 416.287712][T26676] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 416.293527][T26676] ? kasan_slab_alloc+0xf/0x20 [ 416.298295][T26676] ? kmem_cache_alloc+0x121/0x710 [ 416.303326][T26676] ? getname_flags+0xd6/0x5b0 [ 416.308011][T26676] ? getname+0x1a/0x20 [ 416.312091][T26676] ? do_sys_open+0x2c9/0x5d0 [ 416.316700][T26676] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 416.322080][T26676] ? _kstrtoul+0x170/0x170 [ 416.326510][T26676] ? get_pid_task+0xc9/0x190 [ 416.331106][T26676] ? kmem_cache_alloc+0x58e/0x710 [ 416.336143][T26676] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 416.341875][T26676] do_filp_open+0x1a1/0x280 [ 416.346390][T26676] ? may_open_dev+0x100/0x100 [ 416.351083][T26676] ? __kasan_check_read+0x11/0x20 [ 416.356117][T26676] ? do_raw_spin_unlock+0x57/0x270 [ 416.362744][T26676] ? _raw_spin_unlock+0x2d/0x50 [ 416.367615][T26676] ? __alloc_fd+0x487/0x620 [ 416.372139][T26676] do_sys_open+0x3fe/0x5d0 [ 416.376570][T26676] ? filp_open+0x80/0x80 [ 416.381441][T26676] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 416.387526][T26676] __x64_sys_open+0x7e/0xc0 [ 416.392041][T26676] do_syscall_64+0xfa/0x760 [ 416.396556][T26676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.402460][T26676] RIP: 0033:0x413711 [ 416.406367][T26676] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 416.425988][T26676] RSP: 002b:00007f79a514a7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 416.434410][T26676] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 22:14:09 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x7fffe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fa) flistxattr(r0, 0x0, 0x41) 22:14:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x4000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) r2 = socket$inet(0x2, 0x5, 0x0) r3 = fcntl$dupfd(r1, 0x406, r1) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x402, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x1, 0x4, 0x2, 0x5, 0x0, 0x2, 0x80, 0x2, 0x7, 0x100000001, 0x33, 0xfffffffffffffff7, 0x401, 0x431e, 0x800, 0x10000, 0x1, 0x7, 0x4, 0xffffffffffffffe1, 0x100000001, 0x1000, 0x7, 0x0, 0x5, 0x80000000, 0x7, 0x2, 0x7, 0x0, 0x100, 0x3, 0x8, 0x7, 0xcf, 0x55c, 0x0, 0x6e3, 0x2, @perf_config_ext={0x9, 0x58}, 0x12200, 0x5, 0x200, 0x9, 0x7, 0x7, 0x3}, r5, 0x4, r4, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000200)=',\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000000)={{0x3, 0x3, 0xffffffff7fffffff, 0x2, 0xfffffffffffffffe}, 0x8, 0xffffffffffffffe1, 0x4}) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) [ 416.442386][T26676] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f79a514a850 [ 416.450383][T26676] RBP: 000000000075bfc8 R08: 000000000000000f R09: 0000000000000000 [ 416.458480][T26676] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f79a514b6d4 [ 416.467310][T26676] R13: 00000000004c8c67 R14: 00000000004dfaf8 R15: 0000000000000003 [ 416.502335][T26676] ERROR: Out of memory at tomoyo_realpath_from_path. 22:14:10 executing program 4 (fault-call:1 fault-nth:4): syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:10 executing program 2: socketpair$unix(0x1, 0x2000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x5865, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:10 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfpplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:10 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3ff, 0x400000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) [ 416.731245][T27077] FAULT_INJECTION: forcing a failure. [ 416.731245][T27077] name failslab, interval 1, probability 0, space 0, times 0 [ 416.754602][T27077] CPU: 0 PID: 27077 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190801 #57 [ 416.763754][T27077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.763762][T27077] Call Trace: [ 416.763790][T27077] dump_stack+0x172/0x1f0 [ 416.763812][T27077] should_fail.cold+0xa/0x15 [ 416.763830][T27077] ? fault_create_debugfs_attr+0x180/0x180 [ 416.763857][T27077] ? kernel_text_address+0x73/0xf0 [ 416.797972][T27077] ? ___might_sleep+0x163/0x280 [ 416.802838][T27077] __should_failslab+0x121/0x190 [ 416.808471][T27077] should_failslab+0x9/0x14 [ 416.812977][T27077] __kmalloc+0x2e0/0x770 [ 416.817220][T27077] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 416.822975][T27077] tomoyo_realpath_from_path+0xcd/0x7b0 [ 416.828517][T27077] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 416.834769][T27077] tomoyo_check_open_permission+0x2a8/0x3f0 [ 416.840679][T27077] ? tomoyo_path_number_perm+0x520/0x520 [ 416.846369][T27077] ? lock_downgrade+0x920/0x920 [ 416.851219][T27077] ? rwlock_bug.part.0+0x90/0x90 [ 416.856153][T27077] ? lockref_get+0x16/0x60 [ 416.860562][T27077] tomoyo_file_open+0xa9/0xd0 [ 416.865242][T27077] security_file_open+0x71/0x300 [ 416.870176][T27077] do_dentry_open+0x373/0x1250 [ 416.874939][T27077] ? match_exception_partial+0x242/0x2d0 [ 416.880584][T27077] ? chown_common+0x5c0/0x5c0 [ 416.885274][T27077] ? inode_permission+0xb4/0x560 [ 416.890212][T27077] vfs_open+0xa0/0xd0 [ 416.894289][T27077] path_openat+0x10e9/0x4630 [ 416.898877][T27077] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 416.904764][T27077] ? kasan_slab_alloc+0xf/0x20 [ 416.909523][T27077] ? kmem_cache_alloc+0x121/0x710 [ 416.914664][T27077] ? getname_flags+0xd6/0x5b0 [ 416.919346][T27077] ? getname+0x1a/0x20 [ 416.923425][T27077] ? do_sys_open+0x2c9/0x5d0 [ 416.928022][T27077] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 416.933397][T27077] ? __alloc_pages_nodemask+0x578/0x900 [ 416.938951][T27077] ? cache_grow_end+0xa4/0x190 [ 416.943716][T27077] ? __kasan_check_read+0x11/0x20 [ 416.948742][T27077] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 416.954489][T27077] do_filp_open+0x1a1/0x280 [ 416.959000][T27077] ? may_open_dev+0x100/0x100 [ 416.963707][T27077] ? __kasan_check_read+0x11/0x20 [ 416.968737][T27077] ? do_raw_spin_unlock+0x57/0x270 [ 416.973848][T27077] ? _raw_spin_unlock+0x2d/0x50 [ 416.978697][T27077] ? __alloc_fd+0x487/0x620 [ 416.983223][T27077] do_sys_open+0x3fe/0x5d0 [ 416.987638][T27077] ? filp_open+0x80/0x80 [ 416.991886][T27077] ? switch_fpu_return+0x1fa/0x4f0 [ 416.997012][T27077] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 417.003107][T27077] __x64_sys_open+0x7e/0xc0 [ 417.007609][T27077] do_syscall_64+0xfa/0x760 [ 417.012111][T27077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.018006][T27077] RIP: 0033:0x413711 [ 417.022155][T27077] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 417.041757][T27077] RSP: 002b:00007f79a514a7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 417.050629][T27077] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 [ 417.058606][T27077] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f79a514a850 [ 417.066572][T27077] RBP: 000000000075bfc8 R08: 000000000000000f R09: 0000000000000000 [ 417.074544][T27077] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f79a514b6d4 22:14:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) [ 417.082519][T27077] R13: 00000000004c8c67 R14: 00000000004dfaf8 R15: 0000000000000003 [ 417.091676][T27077] ERROR: Out of memory at tomoyo_realpath_from_path. 22:14:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4cb01, 0x0) write$P9_RAUTH(r2, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x80, 0x2, 0x8}}, 0x14) 22:14:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:10 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000040)=""/5) 22:14:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:10 executing program 4 (fault-call:1 fault-nth:5): syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) r2 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000140)=':.\x00', &(0x7f0000000180)) 22:14:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6558, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:10 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfuplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/60, &(0x7f0000000140)=0x3c) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x515, 0x800) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 22:14:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) [ 417.438176][T27603] FAULT_INJECTION: forcing a failure. [ 417.438176][T27603] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 417.451431][T27603] CPU: 0 PID: 27603 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190801 #57 [ 417.451440][T27603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.451445][T27603] Call Trace: [ 417.451473][T27603] dump_stack+0x172/0x1f0 [ 417.451494][T27603] should_fail.cold+0xa/0x15 [ 417.451511][T27603] ? fault_create_debugfs_attr+0x180/0x180 [ 417.451534][T27603] should_fail_alloc_page+0x50/0x60 [ 417.451555][T27603] __alloc_pages_nodemask+0x1a1/0x900 [ 417.474020][T27603] ? lock_downgrade+0x920/0x920 [ 417.474041][T27603] ? __alloc_pages_slowpath+0x2520/0x2520 [ 417.509829][T27603] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 417.515579][T27603] ? fault_create_debugfs_attr+0x180/0x180 [ 417.521436][T27603] cache_grow_begin+0x90/0xd20 [ 417.526212][T27603] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 417.532045][T27603] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.538293][T27603] __kmalloc+0x6b2/0x770 [ 417.542544][T27603] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 417.542559][T27603] tomoyo_realpath_from_path+0xcd/0x7b0 [ 417.542572][T27603] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 417.542591][T27603] tomoyo_check_open_permission+0x2a8/0x3f0 [ 417.542606][T27603] ? tomoyo_path_number_perm+0x520/0x520 [ 417.542637][T27603] ? lock_downgrade+0x920/0x920 [ 417.542650][T27603] ? rwlock_bug.part.0+0x90/0x90 [ 417.542666][T27603] ? lockref_get+0x16/0x60 [ 417.542686][T27603] tomoyo_file_open+0xa9/0xd0 [ 417.581530][T27603] security_file_open+0x71/0x300 [ 417.581550][T27603] do_dentry_open+0x373/0x1250 [ 417.581564][T27603] ? match_exception_partial+0x242/0x2d0 [ 417.581581][T27603] ? chown_common+0x5c0/0x5c0 [ 417.581597][T27603] ? inode_permission+0xb4/0x560 [ 417.581617][T27603] vfs_open+0xa0/0xd0 [ 417.590712][T27603] path_openat+0x10e9/0x4630 [ 417.590727][T27603] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 417.590748][T27603] ? kasan_slab_alloc+0xf/0x20 [ 417.634784][T27603] ? kmem_cache_alloc+0x121/0x710 [ 417.639820][T27603] ? getname_flags+0xd6/0x5b0 [ 417.644518][T27603] ? getname+0x1a/0x20 [ 417.648594][T27603] ? do_sys_open+0x2c9/0x5d0 [ 417.653206][T27603] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 417.658584][T27603] ? __alloc_pages_nodemask+0x578/0x900 [ 417.664160][T27603] ? cache_grow_end+0xa4/0x190 [ 417.668937][T27603] ? __kasan_check_read+0x11/0x20 [ 417.673998][T27603] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 417.679736][T27603] do_filp_open+0x1a1/0x280 [ 417.684251][T27603] ? may_open_dev+0x100/0x100 [ 417.688947][T27603] ? __kasan_check_read+0x11/0x20 [ 417.693996][T27603] ? do_raw_spin_unlock+0x57/0x270 [ 417.699116][T27603] ? _raw_spin_unlock+0x2d/0x50 [ 417.703998][T27603] ? __alloc_fd+0x487/0x620 [ 417.708533][T27603] do_sys_open+0x3fe/0x5d0 [ 417.712987][T27603] ? filp_open+0x80/0x80 [ 417.717240][T27603] ? switch_fpu_return+0x1fa/0x4f0 [ 417.722363][T27603] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 417.728438][T27603] __x64_sys_open+0x7e/0xc0 [ 417.732950][T27603] do_syscall_64+0xfa/0x760 [ 417.737475][T27603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.743376][T27603] RIP: 0033:0x413711 [ 417.747280][T27603] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 417.767886][T27603] RSP: 002b:00007f79a514a7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 417.776310][T27603] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 22:14:11 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfxplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:11 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x3, r2}, {0x2, 0x2, r3}, {0x2, 0x4, r4}, {0x2, 0x2, r5}, {0x2, 0x2, r6}, {0x2, 0x0, r7}], {0x4, 0x4}, [{0x8, 0x4, r8}, {0x8, 0x2, r9}], {0x10, 0x5}, {0x20, 0x1}}, 0x64, 0x3) 22:14:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x3) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000300)={0x0, 0x0, 0x2, 0x8450}) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000380)={0x0, 0x938, 0x3, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0x100}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000340)={0x500000, r4, 0x10003, 0x65}) r5 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x2, 0x20000) getsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000140)=0x10001, &(0x7f0000000180)=0x4) write$P9_RXATTRWALK(r3, &(0x7f0000000040)={0xf, 0x1f, 0x2, 0x6bf}, 0xf) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) inotify_init1(0x80800) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getroute={0x14, 0x1a, 0x109, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4) 22:14:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) [ 417.784287][T27603] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f79a514a850 [ 417.794546][T27603] RBP: 000000000075bfc8 R08: 000000000000000f R09: 0000000000000000 [ 417.794555][T27603] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f79a514b6d4 [ 417.794562][T27603] R13: 00000000004c8c67 R14: 00000000004dfaf8 R15: 0000000000000003 22:14:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6f15, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:11 executing program 4 (fault-call:1 fault-nth:6): syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:11 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x304}, "ae19ee523de113dd", "ebb960e1d801a0a2932978a8005f32ab6ae7313671f3cb00ebfeab9d926de46a", "befaeb18", "c5fbf7fecec15b98"}, 0x38) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:11 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs\nlus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x8100, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x18000, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x110, r2, 0x0) r3 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:11 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:12 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs#lus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) [ 418.775021][T28414] FAULT_INJECTION: forcing a failure. [ 418.775021][T28414] name failslab, interval 1, probability 0, space 0, times 0 [ 418.798858][T28414] CPU: 0 PID: 28414 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190801 #57 [ 418.808019][T28414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.808027][T28414] Call Trace: [ 418.808055][T28414] dump_stack+0x172/0x1f0 [ 418.808076][T28414] should_fail.cold+0xa/0x15 [ 418.808094][T28414] ? fault_create_debugfs_attr+0x180/0x180 [ 418.808110][T28414] ? ___might_sleep+0x163/0x280 [ 418.808131][T28414] __should_failslab+0x121/0x190 [ 418.808156][T28414] should_failslab+0x9/0x14 [ 418.825948][T28414] __kmalloc+0x2e0/0x770 [ 418.825972][T28414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.825996][T28414] ? d_absolute_path+0x11b/0x170 [ 418.836500][T28414] ? __d_path+0x140/0x140 [ 418.846398][T28414] ? tomoyo_encode2.part.0+0xf5/0x400 [ 418.846413][T28414] tomoyo_encode2.part.0+0xf5/0x400 [ 418.846431][T28414] tomoyo_encode+0x2b/0x50 [ 418.861430][T28414] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 418.861446][T28414] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 418.861466][T28414] tomoyo_check_open_permission+0x2a8/0x3f0 [ 418.861482][T28414] ? tomoyo_path_number_perm+0x520/0x520 [ 418.861512][T28414] ? lock_downgrade+0x920/0x920 [ 418.861524][T28414] ? rwlock_bug.part.0+0x90/0x90 [ 418.861540][T28414] ? lockref_get+0x16/0x60 [ 418.861561][T28414] tomoyo_file_open+0xa9/0xd0 [ 418.870866][T28414] security_file_open+0x71/0x300 [ 418.870884][T28414] do_dentry_open+0x373/0x1250 [ 418.870897][T28414] ? match_exception_partial+0x242/0x2d0 [ 418.870913][T28414] ? chown_common+0x5c0/0x5c0 [ 418.870927][T28414] ? inode_permission+0xb4/0x560 [ 418.870944][T28414] vfs_open+0xa0/0xd0 [ 418.870965][T28414] path_openat+0x10e9/0x4630 [ 418.870979][T28414] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 418.870998][T28414] ? kasan_slab_alloc+0xf/0x20 [ 418.972669][T28414] ? kmem_cache_alloc+0x121/0x710 [ 418.977725][T28414] ? getname_flags+0xd6/0x5b0 [ 418.982430][T28414] ? getname+0x1a/0x20 [ 418.986526][T28414] ? do_sys_open+0x2c9/0x5d0 [ 418.991139][T28414] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 418.996525][T28414] ? __alloc_pages_nodemask+0x578/0x900 [ 419.002085][T28414] ? cache_grow_end+0xa4/0x190 [ 419.006864][T28414] ? __kasan_check_read+0x11/0x20 [ 419.011904][T28414] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 419.017655][T28414] do_filp_open+0x1a1/0x280 [ 419.022189][T28414] ? may_open_dev+0x100/0x100 [ 419.026976][T28414] ? __kasan_check_read+0x11/0x20 [ 419.032008][T28414] ? do_raw_spin_unlock+0x57/0x270 [ 419.037125][T28414] ? _raw_spin_unlock+0x2d/0x50 [ 419.041994][T28414] ? __alloc_fd+0x487/0x620 [ 419.046868][T28414] do_sys_open+0x3fe/0x5d0 [ 419.051294][T28414] ? filp_open+0x80/0x80 [ 419.055550][T28414] ? switch_fpu_return+0x1fa/0x4f0 [ 419.060695][T28414] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 419.066895][T28414] __x64_sys_open+0x7e/0xc0 [ 419.071415][T28414] do_syscall_64+0xfa/0x760 [ 419.075934][T28414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.081864][T28414] RIP: 0033:0x413711 [ 419.086032][T28414] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 419.105908][T28414] RSP: 002b:00007f79a514a7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 419.114347][T28414] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000413711 [ 419.122329][T28414] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f79a514a850 [ 419.130312][T28414] RBP: 000000000075bfc8 R08: 000000000000000f R09: 0000000000000000 [ 419.138400][T28414] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f79a514b6d4 [ 419.146826][T28414] R13: 00000000004c8c67 R14: 00000000004dfaf8 R15: 0000000000000003 [ 419.166999][T28414] ERROR: Out of memory at tomoyo_realpath_from_path. 22:14:12 executing program 4 (fault-call:1 fault-nth:7): syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0xffffffffffffff01, 0x8000, 0x8, 0xfacf, r3}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000240)=@assoc_value, &(0x7f0000000280)=0x8) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000180)=""/113, 0x71}], 0x1, 0x0) 22:14:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x8502, 0x20) flistxattr(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000240)=0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x108, 0x70bd26, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x8000) 22:14:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x34000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:12 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs%lus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:12 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0xa, 0x800, 0x10000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r2, 0x0, 0x30}, &(0x7f00000000c0)=0xc) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x2000, 0x0) ioctl$VIDIOC_OVERLAY(r3, 0x4004560e, &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:12 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000000)) 22:14:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x400300, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000040)) 22:14:12 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs*lus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:12 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x5, [0xff, 0x1000, 0x0, 0xfff, 0x8001]}, &(0x7f0000000400)=0x12) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000440)={r2, 0x20, 0x20}, &(0x7f0000000480)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x10001) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000000)=0x200000, 0x4) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x80000, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x81) r2 = socket$inet(0x2, 0x5, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x6a3e360ac02b68bd, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0xff, r4, 0x0, 0x0, 0x1}}, 0x20) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf0ffff, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs+lus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14, 0x80000) r4 = getuid() r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000004200)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000004240)={r6, 0x3}, 0x8) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f0000000140)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f0000000300)=""/85, 0x55}], 0x3, &(0x7f00000003c0)=""/90, 0x5a}, 0x400}, {{&(0x7f0000000440)=@xdp, 0x80, &(0x7f0000001880)=[{&(0x7f00000004c0)=""/112, 0x70}, {&(0x7f0000000540)=""/166, 0xa6}, {&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000000640)=""/145, 0x91}, {&(0x7f0000000700)=""/219, 0xdb}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/119, 0x77}], 0x7, &(0x7f0000001900)=""/116, 0x74}, 0x3}, {{&(0x7f0000001980)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/144, 0x90}], 0x2, &(0x7f0000002b00)=""/21, 0x15}, 0x2761}, {{&(0x7f0000002b40)=@ax25={{0x3, @null}, [@rose, @netrom, @remote, @bcast, @remote, @bcast, @rose]}, 0x80, &(0x7f0000003cc0)=[{&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/123, 0x7b}, {&(0x7f0000003c40)=""/74, 0x4a}], 0x3, &(0x7f0000003d00)=""/27, 0x1b}}, {{0x0, 0x0, &(0x7f0000003e40)=[{&(0x7f0000003d40)=""/90, 0x5a}, {&(0x7f0000003dc0)=""/123, 0x7b}], 0x2, &(0x7f0000003e80)=""/248, 0xf8}, 0x4}], 0x5, 0x0, &(0x7f00000040c0)={0x77359400}) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000004300)={0x6, 0x8, 0x4, 0x10e000, {}, {0x1, 0x3, 0x608, 0x2, 0x80, 0xbd7, "e8179a08"}, 0x4, 0x2, @planes=&(0x7f0000004100)={0x7, 0x5, @userptr=0x401, 0x1f}, 0x4}) sendmsg$nl_xfrm(r1, &(0x7f00000041c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x810000}, 0xc, &(0x7f0000004180)={&(0x7f0000004280)=ANY=[@ANYBLOB="580000002000060828bd7000fddbdf252b00000000000000000400000000ffffffffffffff0200000000000000000000000000014e23dcf84e2200000200a0805e000000fa73c651e123b9", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0c001c00", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0x58}}, 0x8d0) mount$9p_fd(0x0, &(0x7f0000004140)='./file0\x00', &(0x7f0000004380)='9p\x00', 0x80000, &(0x7f00000043c0)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '-eth1'}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@posixacl='posixacl'}], [{@fsmagic={'fsmagic'}}, {@euid_lt={'euid<', r4}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/sequencer\x00'}}]}}) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:13 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='\\dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, 0x0, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000140)={&(0x7f0000000040)=[0x7, 0x1], 0x2, 0xb1, 0x0, 0x20, 0xfffffffffffffffa, 0x8, {0xd7c8, 0x7, 0x1, 0x5, 0x5, 0x9, 0xef8f, 0x0, 0x100, 0x0, 0xea, 0xffffffffffffff58, 0x7fff, 0x7, "14dd01b714bd2bddfb2d5a51a6a364acd23629e6c34478759156c177dfbf7ba8"}}) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:13 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/.ev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs-lus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:13 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x2000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffffffffffff) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x2, 0x5, 0x0) 22:14:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:13 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='//ev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 420.304405][T29938] QAT: Invalid ioctl [ 420.330420][T30101] QAT: Invalid ioctl 22:14:13 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0)=0x5, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0x7, 0x1]) r2 = syz_open_dev$sndctrl(&(0x7f0000000480)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc4c85512, &(0x7f00000004c0)=ANY=[@ANYBLOB]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0xffffffffffffff0e) 22:14:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x3000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) io_setup(0x1, &(0x7f0000000000)) 22:14:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs.lus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, 0x0, 0x0) 22:14:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.current\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14) connect$can_bcm(r1, &(0x7f0000000500)={0x1d, r2}, 0x10) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x191100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) mount$fuse(0x0, &(0x7f0000000000)='\x00', &(0x7f0000000040)='fuse\x00', 0x8041, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}], [{@uid_gt={'uid>', r6}}, {@context={'context', 0x3d, 'system_u'}}]}}) 22:14:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, 0x0, 0x0) 22:14:13 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/\\ev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x4000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:14 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs0lus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, 0x0, 0x0) 22:14:14 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, r2, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7d}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xbf}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000001}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x200}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0xb8}}, 0x40000) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x5000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) 22:14:14 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/d%v/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:14 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsXlus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:14 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000500)=@xdp, &(0x7f0000000580)=0x80, 0x800) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x80000001, 0x201, 0x5, 0x8, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000240)={r2, 0x6}, &(0x7f0000000280)=0x8) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000006c0)={&(0x7f00000005c0), 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x0, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x8001, 0x400080) write$apparmor_exec(r4, &(0x7f0000000180)={'exec ', 'syz1\x00'}, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x5, 0x0) r6 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xff, 0x200000) r7 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffd000/0x3000)=nil) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) shmat(r7, &(0x7f0000ffb000/0x4000)=nil, 0x1000) ioctl$PPPIOCSACTIVE(r6, 0x40107446, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x1, 0x81, 0x7, 0x1a}, {0x1c, 0x9, 0x1, 0x7}, {0x8, 0x2, 0xfffffffffffff001, 0x7}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:14 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/d/v/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/24], 0x48}, 0x0) 22:14:14 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x5, 0x7fffffff, 0xff}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r4, 0x4}, 0x8) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x1d, r1}, 0x10, &(0x7f0000000200)={&(0x7f0000000140)={0x6, 0x110, 0x80, {}, {r2, r3/1000+30000}, {0x4, 0x0, 0xffffffff, 0x5}, 0x1, @can={{0x4, 0x10000, 0x4, 0x1}, 0x1, 0x1, 0x0, 0x0, "e770dd2e78f5ea1c"}}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x845) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@fat=@check_relaxed='check=relaxed'}]}) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x48) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:14 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs\\lus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x8000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:14 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x82003, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x6f) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x82102) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000040)) 22:14:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) [ 421.244134][T31302] FAT-fs (loop2): bogus number of reserved sectors [ 421.269184][T31302] FAT-fs (loop2): Can't find a valid FAT filesystem 22:14:14 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/d\\v/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x9000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x18000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000040)={0x3, 0x3}) [ 421.357437][T31408] QAT: Invalid ioctl 22:14:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) 22:14:14 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x880000000400200) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000001280)={0x1, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1, 0x1, [{{0x2, 0x4e24, @multicast1}}]}, 0x110) flistxattr(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x1044, 0x2b, 0x212, 0x70bd2a, 0x25dfdbfb, {0x10}, [@generic="a31251bbdcf7e360d950", @nested={0x24, 0x6e, [@generic="6e832b88a629a140ed7ee098ea46c64e04db14ad6ca31dadf1e4587ff7e5"]}, @generic="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"]}, 0x1044}, 0x1, 0x0, 0x0, 0x18f514043fba4b7}, 0x0) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) 22:14:14 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsclus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000040)=0xc) 22:14:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xa000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) 22:14:15 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/de\\/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:15 executing program 1: r0 = eventfd(0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) accept$inet(r1, &(0x7f0000000080), &(0x7f00000000c0)=0x10) read$eventfd(r0, &(0x7f0000000000), 0x8) socketpair$unix(0x1, 0x400000003, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000040)=""/105) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR], 0x30}, 0x0) 22:14:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xb000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsdlus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000280)={0x9d0000, 0x1, 0xfffffffffffeffff, [], &(0x7f0000000240)={0x9b0b35, 0x2, [], @value=0x7}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) select(0x40, &(0x7f0000000040)={0x101, 0x200, 0x2, 0x6, 0x5431c05f, 0x9, 0xfffffffffffeffff, 0x2}, &(0x7f0000000080)={0xfb2, 0x3, 0x101, 0x1, 0x1, 0x3, 0x0, 0x8}, &(0x7f0000000140)={0x8, 0xda4, 0x0, 0x793, 0x1, 0x9, 0xffffffffffff613c, 0x6}, &(0x7f00000001c0)={r3, r4/1000+10000}) 22:14:15 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev\\input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR], 0x30}, 0x0) 22:14:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400080, 0x0) recvmsg$kcm(r1, &(0x7f0000001340)={&(0x7f0000000040)=@nl=@proc, 0x80, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/49, 0x31}, {&(0x7f0000001200)=""/211, 0xd3}, {&(0x7f0000000100)=""/160, 0xa0}], 0x4}, 0x40010100) 22:14:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xc000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x109080, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR], 0x30}, 0x0) 22:14:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:15 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/%nput/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xe000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsilus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB], 0x30}, 0x0) 22:14:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB], 0x30}, 0x0) 22:14:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:15 executing program 1: r0 = getpgrp(0xffffffffffffffff) prlimit64(r0, 0xf, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000200)=""/4096, &(0x7f0000000000)=0x1000) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:15 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/.nput/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB], 0x30}, 0x0) 22:14:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f0000000000)=0x960) 22:14:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsllus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x6000) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0x2f, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e20, 0x3, 'lc\x00', 0x2, 0x3, 0x33}, 0x2c) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/12], 0x3c}, 0x0) 22:14:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x10000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:16 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev//nput/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:16 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x81) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x5, 0x440000) r4 = getpgrp(0x0) kcmp(r4, r4, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x6, 0x0, 0xee4, 0x7fffffff}, &(0x7f0000000180)=0x18) syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xfffffffffffffffa, 0x88c00) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={r5, 0xfffffffffffffffb, 0x8}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f00000000c0)={0xa30000, 0x8000, 0x1, [], &(0x7f0000000080)={0x0, 0x1f, [], @string=&(0x7f0000000040)=0x2}}) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000100)=0x9) flistxattr(r1, 0x0, 0xffffffffffffffb4) 22:14:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/12], 0x3c}, 0x0) 22:14:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x11000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsolus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) dup(r0) flistxattr(0xffffffffffffffff, 0x0, 0x0) rt_sigprocmask(0x3, &(0x7f0000000000)={0x5}, &(0x7f0000000040), 0x8) 22:14:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r2, 0x0, 0x30}, &(0x7f0000000140)=0xc) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:16 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/\\nput/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/12], 0x3c}, 0x0) 22:14:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x12000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101800, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000040)={0x1, 0x0, {0x4, 0x8, 0x0, 0x9, 0x2, 0x7, 0x3, 0x5}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x4e24, @multicast1}}) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsslus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/18], 0x42}, 0x0) 22:14:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x13000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:16 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/i\\put/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/18], 0x42}, 0x0) 22:14:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x14000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:16 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101040, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)={0x200, 0x81, 0x3, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:16 executing program 2: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/18], 0x42}, 0x0) 22:14:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:16 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/in\\ut/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsulus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x40000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/21], 0x45}, 0x0) 22:14:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x2000) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{}, "87004c129d7db559", "15ac8129a0118cc28eb1b2bda253c201", "73fcf307", "5817a589eee58965"}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000140)=0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/21], 0x45}, 0x0) 22:14:17 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/inp\\t/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/21], 0x45}, 0x0) 22:14:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) ptrace$setopts(0x4200, r1, 0x5, 0x100050) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x60000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/23], 0x47}, 0x0) 22:14:17 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)=0xfffffffffffffffd) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(r1, 0x0, 0x0) 22:14:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsxlus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) [ 423.843571][ T2203] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x3 22:14:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/23], 0x47}, 0x0) 22:14:17 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/inpu\\/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 423.892994][ T2211] ip_tunnel: non-ECT from 172.20.255.187 with TOS=0x3 22:14:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x65580000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x2, 0x5, 0x0) 22:14:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYPTR, @ANYBLOB="0100"/23], 0x47}, 0x0) 22:14:17 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20400, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, 0x0, 0x0) 22:14:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp\nus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6f150000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYBLOB="0100"/24], 0x40}, 0x0) 22:14:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) r1 = socket$inet(0x2, 0x2005, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) accept$packet(r0, 0x0, &(0x7f0000000000)) 22:14:17 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input\\mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xb8, 0x28c001) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x800) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xe2ac) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={r4, 0x7f, 0x30}, &(0x7f0000000240)=0xc) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000280)) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) r5 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3, 0x1c0010, r5, 0x80000000) 22:14:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYBLOB="0100"/24], 0x40}, 0x0) 22:14:17 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xd0, r2, 0xc, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'nr0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff988}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x90}, 0x4040) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x200400200) r3 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x81000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp#us\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/40, @ANYBLOB="0100"/24], 0x40}, 0x0) 22:14:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x20000) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) syz_emit_ethernet(0xa3, &(0x7f0000000140)={@local, @remote, [{[{0x9100, 0x1, 0x7, 0x3}], {0x8100, 0x9, 0x7, 0x3}}], {@mpls_mc={0x8848, {[{0x7, 0x0, 0x8}, {0x200, 0x0, 0x8}, {0x9, 0x0, 0x2}, {0x0, 0x0, 0xffffffffffff8000}, {0x80000001, 0x0, 0xefe0000000000000}], @ipv6={0x7, 0x6, "509280", 0x51, 0xff, 0xffffffffffffff01, @dev={0xfe, 0x80, [], 0x22}, @local, {[], @udp={0x4e20, 0x4e20, 0x51, 0x0, [@guehdr={0x1, 0x1, 0x5, 0x38, 0x100}, @guehdr={0x1, 0xc7c5, 0xf6, 0xa7, 0x100}, @guehdr={0x2, 0x5, 0x6fa, 0x5, 0x0, [0x80]}], "c74716ab9a1f353fb43beed5fd973e3572a964e02917290da79becec17befa33a5ae9f42e8c60617eaa501b0fd2b1877d20f3e715ac8c2c307"}}}}}}}, &(0x7f0000000040)={0x0, 0x2, [0xcfe, 0xfffffffffffffe01, 0xa90, 0x877]}) 22:14:17 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/.ice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) flistxattr(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) 22:14:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:18 executing program 2: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)={{0x108, 0xffffffff, 0x748, 0x1bd, 0x81, 0xfffffffffffff793, 0x175, 0x80}, "a2993f32d44b5d8c9078f8e06e64619b233159b9ce1d6dc12fa8138688378817794b3587cdcc495282f69e767ee5d513132b5e0ea0c6249d2cd788afc9a4039f6e6c17bb45e4f637b92ef21ceea9d42c212dbd5f6347a60862d699135aec7ba20d7333da3fb7e4fcd3d6e09102b1d919fd17bfb57b5a09b39abbc7775d64d0230cd8d5bbf4458fe363c1322b68d85d10ff1ea8da46e024469ad45682ed7e5b35e25529581b7f1f976e12b5c249468e6458850e59d85545566f8bb8e0a0356413d0ef2f6880d21e8a79fc9b324ce5c090d1551b63bafb6a11e6974d819cf60e56fde6eea47a4ad7c23bcb46076880ca2ef116f350", [[], [], [], [], []]}, 0x614) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x220801, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x240a4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x10c, r4, 0x630, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x4}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x955}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x56}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400000000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x2000c800}, 0x1) 22:14:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x88a8ffff, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp%us\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:18 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(r0, 0x0, 0x1d8) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$SIOCX25GDTEFACILITIES(r2, 0x89ea, &(0x7f0000001480)) r3 = dup3(r1, r1, 0x80000) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000000)=0x8, 0x4) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x4, &(0x7f0000001400)=[{&(0x7f00000000c0)="479db9af952ac5a83ec604337db654345cac8e48d1e44b984ceb4b8dd4ea9550ce24c3d1aa350022636d56cc6c0f31f4739141e0d76e3d8450f25ae7aa56f8cc38fbd74dc5635da0c46afe2cf38f8b237f9556a67b726b15a34a0a8d01a223f519a745b17296ae67f81c0de595c23453d1eb045f430140c6e67b10ef2c1843faf563f24df6678cea933f01c494fa232615931e29f51c1ea498", 0x99, 0x40}, {&(0x7f0000000200)="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", 0x1000, 0x3543}, {&(0x7f0000001200)="de571bcc2dd38523d447973473281ff15c8ea882c104df541daf4b74ab728f3b5a82217aaf6d7bbd084fd2b5bbfdc1c5755837ca284da08cd04f556ef9bc8576b172da13aea3e28fb8064111f753615db48bc9e6038f69689c50a8200f151e52e705fc752c9d8045e57e282755794329bd607454fbceedcd7ec8536923563ae64e2261e53ab8d385e63892911209f97bac50abccba59d134732cec72b641e43863bf2efc4b331d82816cad3d2a0ab6b71a0cc93de81e07ea9593f1ea40a4abba080f08f29524d08402ff5714ae76d3f8737452a51c333ec92c869a8b0cec506f75378e5231ef", 0xe6}, {&(0x7f0000001300)="7601e11ce2564ecbceb8ae5c2a8db29629c1ba205edf414d62a5b1dd3c4976c3676577b0d8d506e9e51b5004aacfddaa09062faeb32bac1df9b56506d67b4dc9061bf0dfb57b578c92a74da9f82a88e5d01b42d0d1b301234373cc15d2cbe0c2cd3547bf326f3e1ed9efe85fe7a97dc8c79030f1ac1f79c57bcc65b5b41d1f5695426ab5c1bb7a968caacb85ecb65cbcb81a777eae37f63a3856343932b3a190e18fd0ce10f24797f9c95e4222d5fe3271080b98ec9810f436fa9e033a974be7b9ce5b26270eeaf06b3cdb7cbde8b78dfdfd1e4781965cb6049ea5fdee0d90e1c903551b602a3ef44a03df", 0xeb, 0x8}], 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"]) 22:14:18 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input//ice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x553041, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r4, 0xfffffffffffffffc, 0x100}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x9, @local, 0x800}, {0xa, 0x4e21, 0x2000000000000, @remote, 0x2}, r3, 0xffffffff}}, 0x48) 22:14:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x9effffff, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) r2 = accept(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x80) accept$nfc_llcp(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x60) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) r3 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x80400) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) 22:14:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) [ 424.938203][ T3585] XFS (loop1): unknown mount option [smackfsdef=$']securityuser]. 22:14:18 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/\\ice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp*us\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200840, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x2, 0x8, [], &(0x7f0000000040)=0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) 22:14:18 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400900, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x44000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x100, 0x70bd2a, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r3, 0x200, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xd6a}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x80) 22:14:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf0ffffff, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={r2, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, 0xc) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) write$P9_RREADLINK(r3, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 22:14:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:18 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/m%ce\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:18 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x4800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}], 0x20) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), 0x4) r1 = dup(0xffffffffffffffff) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x19) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x800) r3 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xffffa888, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYPTR, @ANYBLOB="0100"/24], 0x20}, 0x0) 22:14:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp+us\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x80010, r0, 0x8000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000000c0)={@remote, @broadcast, 0x0}, &(0x7f0000000100)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth1_to_hsr\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'sit0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000002c0)={0x0, @multicast2, @loopback}, &(0x7f0000000300)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000200)={@dev, 0x0}, &(0x7f0000000280)=0x3d6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000007700)={'dummy0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007740)={0x0, @initdev, @multicast2}, &(0x7f0000007780)=0xc) getsockname$packet(r0, &(0x7f00000077c0)={0x11, 0x0, 0x0}, &(0x7f0000007800)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000003c0)={@remote, 0x0}, &(0x7f0000000380)=0xc) getsockname$packet(r0, &(0x7f00000078c0)={0x11, 0x0, 0x0}, &(0x7f0000007900)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000007a00)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000007a40)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000007b40)=0xe8) getpeername$packet(r1, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007c80)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007cc0)={0x0, @loopback, @multicast2}, &(0x7f0000007d00)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000007d40)={@mcast2, 0x0}, &(0x7f0000007d80)=0x14) getsockname$packet(r0, &(0x7f0000007f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007fc0)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000009540)={0x0, @dev, @multicast2}, &(0x7f0000009580)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000009b00)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000009c00)=0xe8) recvmsg(r2, &(0x7f0000009f80)={&(0x7f0000009c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000009ec0)=[{&(0x7f0000009cc0)=""/213, 0xd5}, {&(0x7f0000009dc0)=""/207, 0xcf}], 0x2, &(0x7f0000009f00)=""/120, 0x78}, 0x40000143) getsockname$packet(r0, &(0x7f0000009fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a000)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000a040)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000400)=0xffffffffffffff2d) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f000000a1c0)={'veth1\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000a200)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}}}, &(0x7f000000a300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000a340)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f000000a440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000a480)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@initdev}}, &(0x7f000000a580)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000aec0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f000000ae80)={&(0x7f000000a5c0)={0x898, r3, 0x200, 0x70bd27, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0xfc, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x685}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xc68}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x4}}, {{0x8, 0x1, r8}, {0x1c0, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0x58, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x6, 0x3, 0x3ff, 0xa00c}, {0x81, 0x7, 0x1ff, 0x2}, {0xfffffffffffffff8, 0x70a, 0x100000000, 0xff}, {0x100, 0xb1b, 0x9, 0x2}]}}}]}}, {{0x8, 0x1, r17}, {0x4}}, {{0x8, 0x1, r18}, {0x254, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xf68}}}]}}, {{0x8, 0x1, r21}, {0x84, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r24}, {0xb8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r26}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r27}, {0x190, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x1000, 0x20, 0x4, 0xfffffffffffffffa}, {0x100000001, 0x3, 0x3, 0x10000}, {0x800, 0x7fffffff, 0x201, 0x7}, {0xe8, 0x7ff, 0x9, 0x542}, {0x7, 0x5, 0x2bc0, 0x1ff}, {0x1f, 0x0, 0x8, 0x9}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xf939}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r28}}, {0x8}}}]}}]}, 0x898}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000) 22:14:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x600000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="70000000e7a93dff0e2589048ecc60f38c8989656c2fe2b065b7585c0b9146d1e7f24afd482a0a3b431faf7b9a5932a8b6f11bab62c2d0237b2b4bcd5ab3ce368ffb839493fdd75e179f17f3f2aa5b7d5034717f145e75853a102f4c09201d7b268b10179eaf182dceff57042d09e882b74ddd0e1bc583", @ANYRES16=r2, @ANYBLOB="040027bd7000fcdbdf250200000008000200020039b81a61600759560000080004000000000008000600e000005614000900ff0200000000000000000000000000051400090000000000000000000000ffff0000000704000500150002000200"/106], 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x24040000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xfffff000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:19 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/m.ce\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100000000000000", @ANYPTR, @ANYBLOB="0100"/24], 0x34}, 0x0) 22:14:19 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp-us\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:19 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) 22:14:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100000000000000", @ANYPTR, @ANYBLOB="0100"/24], 0x34}, 0x0) 22:14:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xffffff7f, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100000000000000", @ANYPTR, @ANYBLOB="0100"/24], 0x34}, 0x0) 22:14:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000100)={0x0, @bt={0x8, 0xffffffffffffdfc3, 0x0, 0x1e4ec19327f03271, 0x401, 0x5510, 0x5, 0x7, 0x5, 0x7, 0x0, 0xfffffffffffffff8, 0x5, 0x2, 0x8, 0xc}}) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f0000000040)=0xffffffffffffff7f) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:19 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/m/ce\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:19 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp.us\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/30, @ANYPTR, @ANYBLOB="0100"/24], 0x3e}, 0x0) 22:14:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xffffff9e, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:19 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x8e00, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:19 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x240080, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x408000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="800100fddbdf2507080000", @ANYRES32=r1, @ANYBLOB="010400000008000008000a00", @ANYRES32=r2, @ANYBLOB="58011600100001000c0005003f00000011000000580001000c000500f2340000ffffff7f1000020006000000cb0c00000900000010000200010000008a0c0000000100000c00040001000000ec000000100002000100010064010000020000000c00040080000000090b00005400010028000100000000000180c2000002000000000000000000000000000000000000000000000000000028000100d2000000ffffffffffff000000000000000000000000000000000000000000000000000098000100100006000400000004000000010000000c00050000000000020000001000020003000000110a000001fcffff0c00030003000000800000000c000300020000000200000014000a0081ffffff00000000000100000000000010000200090000001a040000080000002c000c001400010092a1b00685080000883300008100000014000100040000004f070000199d000000000000"], 0x180}, 0x1, 0x0, 0x0, 0x50}, 0x24000080) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:19 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/m\\ce\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/30, @ANYPTR, @ANYBLOB="0100"/24], 0x3e}, 0x0) 22:14:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f0000000040)=0x2a4) 22:14:19 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp/us\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/30, @ANYPTR, @ANYBLOB="0100"/24], 0x3e}, 0x0) 22:14:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xfffffff0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/35, @ANYPTR, @ANYBLOB="0100"/24], 0x43}, 0x0) 22:14:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x10) flistxattr(0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0xf) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000140), 0x4) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) 22:14:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x40030000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:19 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mi\\e\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) sendmsg(r1, &(0x7f00000028c0)={&(0x7f0000000000)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm-aes-ce\x00'}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000080)="0f9eff1bd3d7266908507277358b63e3a0481ea7595669a746013876265ae907251511c4f71dbf84edcac0c2f1d1df4b02b4", 0x32}, {&(0x7f0000000140)="841227425f6022a49e144e6f245fab8211521b73cff7ef5b14d2e04e7d7392cb528e25395cf0d225d082dd9c5fc0d41eff2484bb4cdb73f8eb4d42ba568ff8ffb1f257660f7065cf020b25dd0652a81f6d5dd75ab3dce56cf2145691add328222bdc8dd53384d9d84e7f0643ef0f2b86b8b0f31322a728f14ca71fc60c749c03cc4c072279626a4c2f923500ed68339b2e7367ded5913e5097107c8af089b9ebf750f0f8cbddfc6627ffe997268222286d5493db3412169a93d8c8cd3a1fc240dc306cd67c27c99e8da2b78f0541f7020a661bea4ac8b1cb6a63e8a794d80f4a20e047868376fe884d2912fcce171eff5e83728fc9b985533476af8a9be97260bdc04f6c60aff48e2a3436260e0d8172ae7fb53dda7d85de6628a34fa9d32c7885f00ed9d32a8ba1de5a9b3f6288df18162dd1aee4eae0a1363030b78e4fe86e2aa437148c71636fd621a0c1165514b6c7525ebafbf29ce160d5c0cadd327ee016a7025e1bccd8b04e5d8ca07728de97592c577d523346e037893db0a7a7db121991f2b553ab14c53bf8f81fa2086c4f7fcfd4ec816a5459ccc57eb1a6d812e3318d7902ef5edc36aaa7b1671d3018a407b92c6510e1fb34805a1d417f9c30e7b12a17beb47b3c62edc095bc9f2fc1550d066187591f1a5cc567061b34d40f77dd5fb247bb6b7d11e23efc1555ef8a8e532661283ac093c22ec5a11a849e53cadb499cb488eba1fb59318e53218ff84818c406e73a7aa80248e2dc617ff924f5e33d4c2eb93468d5689837414fc4a6049feef95e4c4a601605c2fae45d09e23682bd74d3e65b113a8b3d5545c95247062dae9201d44f63354e2223547c3ba898c8ef94bd1b1d963bf5af45e52988b48f33321bd1560a28ed832fac091309f430267e66b46d2559176314259d717bc6da369d4d3f91c6a300127eb34faf9a081d42d736e35de6395765f1a384034ff8804108e72dded5cacf4a01385e3a46534380958f60e9e9ba4ab4869d0d50aa22e897a53d3966dc6d89090c86a1303b338ea21428dae9c36c49effa68f38367703dea443e88d8fabb15225ec8ec9f0eda82df431e2c053627bac2185dc79ca7c6c01f6e25d0c79f8634d322fec972e4cfd578849a820f041835a50072e2a276fb2f5bff2796f66a00d2395140cc1a5f0ec7e5e7757cd54bd3ad3f17bec8fc7b0840baf44c3d8d6cae45b03ac8f02f3cb304c77d1bf2b0c8de8d6a85493262fdae57187e2c6f3aa1fcfd6399ffeeb956013a80420ceffce1ac06471e6e0e92f3220b5df72d4a9e4dc68f4793ccb4ed5aeaf17f6db1dab1f4367a21b23fcaa4c351d070a09231d6fac89a2c26bb80b782300e28436702f9b786192cd7a2b08718deac70d712e19330caf1d4f23744b52bbd3b7a8a5b91e47aa1a882022c29aa9d8bb35e7601a9443e1d380f6dac0fcc964ba1cb63462de6b53065bcd4c6e61cb7b2e23c0ba92e0e016ba714e059dd63cd8e78eb362dd94c040174f569de9df8343adddbda0cf4a22960de9dab1ba6b6b2edd88f0e47e301747ce210356795bba4ed62ed460faf3d680d0173e13142664f46e48a56a9d5292e6808763e8dea802784ccc9cd64566d59cb277046e6c82b86f2929564ace5a4a37664959bda4eb2605aa12879a1583a5cf7b1c84202cc18742aa4c8d1cb14a5af8851cd9dd995073461179f126f862a142a849c4407bb054c5b1abf055eae4f6d35be49720be5096b1163414314be0c21a50949d9e1b6ba7c49042bd68c7f06ec472d05fa8fa9c07b06f4d8c8c9ec57887ab4273551dbc4b3bacd8a945a5e907e95822ab2f2af5ec5178caab2912503b1847b67f433012c6ffb3378cb6c9218c84b202eb2eda98886b6261e297093b6b98e0a817b0b0fd92cc2dcf204b4f5b70e7350d9059f9f0d27f0d71ccd971fddbc8a9f41d92106a49626cda60c7315e66422d01ad0a8ceea2d0f6652af277175af623c2b7408ffce50fdfd516450745a868e7027e228893e26b64e91bdfaa350a475afb5d667f4adc1273f899ef676a30d0937c8860afe4821b5e499150f588154f5398c958e08d1ba382894bb05204f08a2940ae6776ab8b3a47498ec74994f4b6a98574860c43b0ba692a54d32109fb927ec27b7e873a9dc87a6fc58212bcdcd7b8fc1d1ae7d03aa6c85628aa27be18d029b6766fff59f15832b6e1dc631595918c2a8e633a9318ed43fcf12b58adc89cbb15209a4bb1a0b1c6b0b8aadffc2e2b9201266f7a2d545c130b179ba540d5862100dada5b5ac65df2053f3aef933d44783be85146b3659c8bb3b63fb7ed50e22467307c03ebe567862d84f3a8216520c37b073ae0c9b79a6fa9c7f897376772457a609120033082dd8d75d58f29ebb642c1c4288de3b2cff455cd9a0fc18cc8686e51c6c23999b231486984d34deb10e7d18fac9714d8e053f3b43ea3886e95d6c781a800e30558602f6f91172791a3012daf0aea2f1aa4539d845d1193cc6b000333197132496adcf0c46a56c6d976af02e2a8300e8d3814f78c76dc7da551f492c9a67b5b164c20c97d110cc8f0b129fe06f220542fa2f4330cccb159e8e176234b4cb3d1543f21583e4d0c1ac8192148a34bf5f37630f4742970ab4ec0910bf1aa20fb81edb3a9af87b6511dd880c89465e89696867326ab5ae523f78c9577236b03473314de5736dcd88fe2f598a8a3ba708ecadb98af02e44e1534a62723bea9e1d369351a0c4230c133f2c0482a5d3b118eb2cf6e51fdd8c520f01110b3e32bbe196062b041c13f3f87eb9a26bc760062310b9c068ca20faad34980182284ec1c9b49f5df458ef63b560e8e92688e080194f5f2d52d766466e6bf8088b57f50279edc9a7f8d7f6d3e822bdb27666d69b2645d54cd5366d03bd497a77cf33763928cb229db81a658820ee1bd08eabdebba23870ea8d57c79df15fd5329f1c8557d9dab8e66ec72fa5651b6109266eab95790748bbd69862b5f56f7bd46eb9cb72a7693bbf090ba063c2d7816899d191c81f12628b609c249bf6479edf2374ef4654287eec92a1877bdfab98918b005869596602058cb58522576587fa0add93e06222f7ca25957bdb44a435048285a1e141f27c5482513dde6120988e148f537866c5510c1738138b8586e44995cac3472718efcee6407f0e71ce8ddce9dfcf2045e167322241195b7cc487a539329cfcce652d455891d878d62bd70d41cc92f3804d588c062935be390c265d34a89a7ee1b419c8ed55b096cf00ee43395b8243bfc0e0f9605ccfbb379cfb88f4e82e40ab765a27ddf35e4fc1a6d8793c06c55fcad38df7ec8451d90f6b7a05457a0c34faca85fe1f470d01bea1e111095aa042a89e9df68ae3de08226206e5c49de34f73903dbc0f82d30d2a9d2ca0b1c56bf87ed1772598f86e35678652b17f04e3114b9623ad30c36d53917e3aaff3bfb524a66faaf41a0f9a55e404e7190e9511523f9a850711682d858f31ae45c39c27b09a5fcdb7ee7bcca3ef3ea8a4185beddde2cf2c8477cce766cafd4f3cbbcb7af8ba5865d542540d070da12717662587d70df29bf1235186fbaec726fae023d1b93261b7ce097c9eebb8033059b2157dabdfad433dace3b587ce3a1e329b66637c14e7e01de40049a91588a35a0b9962a653788049c380567defd09d7db142a9f7f44ad44f80cc5613b0a990fe021d86dfae2900e0ce53cbbf440873065d3a7d8522c3717ed6151af6237c535877e0f6c7887dea732cf7e69c519cd9d6183bd70c1a952df5d7740af3fb466ebb4c90810e30eebb057c5f9560953db9f2cd045cbcec047d92755f69d26ef288601e9e552e2bef2a808c7cc590c45fd855d3da08b8bc7b598f12b1cbf05d11994717556547c3fceb2e541316c3ea8e1ecc1807a1420660bbbf25ff48c712628fdb3c1434d45ebc5df28bc776656c959c32f4f906e9fa05bcc1879f2dcb9fe4cba97f810512acafb6391f475a000c509245e9068ee47030ba5b76c06f3b0eb383b3fd5ead8b9404b6c65d640fbb77a3658c3adabaa788bbaba38bdcdcd3417775d7b04e3e785c228f2ce059452d3f87b6d2ca9410072c06b6060a031204cb6b65a7aef8b95f3a3c8b5ed387ace9f612c08db3fa24b58769764bcffcb31e384c25cebe467b828375bd0be935c4cc9ad3bfaac111ef4be1bee5a88acd39a5cc0f43fe6cda39568671029dd982612774500491bbbee1fdcdc9e5b5636b84e8f2cb459df3b7297c48f9386912e5bff68e8ab14b0d824ee3183b228326c2497e493d3f9dd1fc19ecd8290eec839252d9454c12829bf138db4309b17802251c5b6953aeabc8054c4684800cce29b525bdfc4d298f45a7329f727966a5b4ecea493fb5f5aaa0d7e370b39db431275d2639395eef3e7e775768e4f9d9f81a6b6b1c5c9fbacbb1c1b2c79a23accff411d78a9a687155fa810871da13f099a97f45fd316fe169e74840f0b4704463eac08be03eea9e010e1274cd471a5a705f1c30c2729a6dcb2616a0772e07b239cc2679a3efd6cad710673e70cc57c43ed8404974752ad2c2c747f19d75e29fb4fb558c7dad3f16a139ea605b1af8f0d9b3f37985a3c8a87c72b186697bb83c12ad4a07d684cca15ed8cac3441176ef0fdd1dd8bb3cfc45fedb8e917fd2d4419ee3bc23debb022f0da22db806f156bc844bec65c1cccdad3021f02064cb6e893ef5c7b5e1bb42a98285d0be09c1de101e80f5a582ce969440e5aaeef69c5da7bab9cbafd5d85d810eb24119e9d16f5dda307024399cc8392c52b34cb62441ec64c091d0d8b1f8d2afc5b7abaccc57e5346e21dd766e6511f0d70093b420904d0fe0037f524ec3b4ca6f762cb1206fcbba2359fb9a93c29e9b60bb9d09d2fde1b7d46fd8a865d726a7a6e0bd2832daaa3d16a8f9ba1a64ad7a254fe09a925c84a5971d6d88fb2cfc9c57d84e1ea42ce9a9b80d5a58e913e7c599f2499a98a657c3605fdd6f9763555c7696670dd3f2030c0e60684023aa9a5fa5544d47b9cf82d845a1e9728efca60610cbda723eb87dcb6c1c61efeeff019ce7db843f78f3f39607ad13d911d15f68ef03eeed2db123edaa7ab0a8ad00df9c39af4c0702f94722043feb330c80e1a1c3338e0632bfe0ce7d0249f91218fb530acc2ef113e05be06c824a6a85af4bd51d8b8f90bfd6baee8adcec392c60a39ab512fe2f2dd8250ee993dfd9c498f557970aa0062d873601fccb4dbf07446d54a152e7e04ed5a0f3184a9334f883001d13b7238103acf6fb23408c344820a3d86858a8584cdfa99f4fed3293238bbaa8fb2dc0bbad82f52d24dd1b9ef8dd96e4e497c8038ee88fd36944ee98438814f5d70ec090b5f216b6e091224f0a042f7b73170e9615852bcf3288035716ed81abc7e3c4199e7e0d5a188f155f9d61bf6e4e01694f54dd6d7921f99a0f2e04a03b8648379e3768cda68a8032b7a2ba4dd21a756d69a56ac4d137b15035744f5eb867fdf45e7ef1092440ddfa2830527ebd2f54b260db735dc48ba0e105fb42259d81c3d21f48d064a7ccd244163833e06cc53ef05aff4914afb63fbea77bd5e3296a731bbf0d3df7a5048f15ad6f58d9da0185003d63d541efcdaba0251d89521f96ba3cb84facafd1633c832ffd32af53d0606d48c3ef11b68df3193e2d1acf6990130574af311417c12c64a1f9347c91a98fe1e14cfa92d630a42f6a62aca8055a1149e9725aa2b22d64de825ae12474b17517938e96a9eb26b83a882730abd55c30404170bfc342772b431dbcc367a6faa87e57762223a47886", 0x1000}, {&(0x7f0000001140)="9afd16479c1f0d7b3e8625867b52842215c93a2dd0e2cf448e2c2d0667f0c91bf717c4698283405ba976d231a0f273df0faf040cb444ae2d00ca4ec629508925d7588e880ac7f118583fcae0ed90cf05fdde0d7905024a133b666b55e0ab56e8989bcf70b32c1d0b2336be2966e86ba85b721cd8b77b1eb95560fbe4efc3222e51f99c0d908c32fc44a4bef1", 0x8c}, {&(0x7f0000001200)="3e18dc5decc5ac5098ab8c1c53aea709df4807cddf60f02d1f7edd9b93792c459ed0b4847b8e43324cd540fdaaa0062839ee8b139c49950f6882fc8fa17e6336aecf01495842f197be134ebbfcc099d7065bfe372bd5f71a3f8592cc2cb2ed82a8cb09142e04898d21195f1330aabf66a8766c63d4bb632bda6b504782942510ee227fe2ae10a0aef60b11f06a7514950c360ba148ee6197c15b450cbe28b7face4a738adc781898c68778a85b34f8086061", 0xb2}, {&(0x7f00000012c0)="d1cee32c3a5be2dddb89edeae445a790f1591cce85d160c37afcbed4a6386556b1a439b2e0e2f0eb87974d10366ab645dd1dd288cff46e707a9c5dbb0713da1acc15f910c279a0d8df18f375ac0e29f1c0f068a55a082f5fd21ca0f464b65d20bee4f520fd5358ee98c4df3cbfb5cd0bcfbaef76342d94db5221a81b82fa1ff8974e516f447a448dc04e768112c88d999c86f9e5aa71ca3a41a480c001ef980495fa41446ee4b2f780f0970ab5afcf98991ebb09503c1fc045f01a9d78349928337838bf35312040954bb99b240815f2b59daf266c4280ecb1ff87bd9627daf4f7f9120899be3f", 0xe7}, {&(0x7f00000013c0)="6f7730aabc175f82ef2e6b476bc5f9b1df2a7a20cfbb1dba895889c9efd49e52b4ccc808b51f652844054fdfd469f5ed1588e8fb8d43afffd55a55ab58dc15fe1ed49ee066353881e9c8df0de858db51b24527fbd438c81d787bfea2250e62ed7b6c6a0b1f8f5f7b43fada1140ca28683ecace3b9733b9b109c0e524e81cefa2219dd37130632309f8308668a8389aeead77d78f258038edc612adf357fbc3bec9038e9fd2d673b607a6cf3f5f3451e27cc77bafd61d26cf833e896963e1dff4e2999c5fdb5db1e593ecd08a38609f89cfdf11838f2f88c63d39e7ecd099ed8b8feb51fcaf276b65c50d0033dbc046be84a72738a45e88c5", 0xf8}, {&(0x7f00000014c0)="fbe3ff50e7ad57bee0801ce58fb8265654bbffef21fecb7668d6910e79c174c038731d", 0x23}, {&(0x7f0000001500)="aa348e4ed444aadba3b79dfa999405fb2b382bdc71839102b0559761688f06dc3707cba99de35df5e06c4516cdf0ab0a55e040285496d043440eebcc1110d61ffdb8b2d84c5161e300f3a7fe5a076b4edd28e1f3f15d42a77e", 0x59}, {&(0x7f0000001580)="1c531652221075cb898dd57f8f9245e76319ae77c7d538c7e2085dbcd81377542fd0e8ffe3e28ed4029d0a7596071b63d1972079d11669b99fec6dc6ca206f183e4d445829d6a4a1960e8e75dd46b9c836fd80e9464ffa7f9a42a60590402978d0247ec58f94de8e5eea783d71677bc822ba95a711e571f54776bdd5098845c09b0fbc3f9770b4d241e581aab0a3ed3624a3d0a7af4757e5151726d3260a084c3bf0862bb37b450070afc98312b1dff9b90ecd19d1decdb6824d7c6a10d4d7dd8fe54da01f344e1e920e33b86ff2d684126817c3735fe2bfa096f6668e9fab9a5fc65f223b009c5787d686feaf8b7a", 0xef}], 0x9, &(0x7f0000001740)=[{0xf0, 0x3a, 0x1, "b96dcae37b9cacbb3817e5dd005819a147f75d2a26e509689f3b1e9eb87b886330d53aea21fd61388315a83c6e0064f1259be6fbd03080832d27dfb6c79d20168573392c29c6bf128de3dc36f8181a2f67a0db603a40a78b0f26646dd85a48174f5a022fd5b8d81f1ebcb8805ea2a33ad78cf9e96212bed2f69d1eb95fc64cb18bea64be778be0849936b0b84768fd7d63a549e87a117e8b84ba4747d2f81069bf331a07ce1619866a440e23b496faaa13a3b04268ebc5c0653d360a758937ed036aff8178e6459db86ace8ef522e8138a6a43b098244d6af5c7"}, {0x1010, 0x0, 0x1, "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"}, {0x58, 0x115, 0x2, "71bc7e3d9747d9601866e71e729b3376c41867799b7fcfea818b21ebf9cfc0fdc64a6bba20f19751018ecf219d93103d7b0658a3642ea2861e599d2810b5240b48c4a9196853"}], 0x1158}, 0x1) 22:14:20 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp0us\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x6, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x15, 0x0, &(0x7f00000000c0)) accept4$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10, 0x80800) 22:14:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/35, @ANYPTR, @ANYBLOB="0100"/24], 0x43}, 0x0) 22:14:20 executing program 1: r0 = socket(0x1b, 0x80002, 0x6) recvfrom$rose(r0, &(0x7f0000000000)=""/78, 0x4e, 0x40000000, &(0x7f0000000080)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={r2, @in={{0x2, 0x4e23, @multicast2}}, 0x489d, 0x10000, 0x9, 0x8, 0x1000}, &(0x7f0000000180)=0x98) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xd) flistxattr(0xffffffffffffffff, 0x0, 0x0) listen(r3, 0x10000) 22:14:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf0ffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:20 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mic%\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/35, @ANYPTR, @ANYBLOB="0100"/24], 0x43}, 0x0) 22:14:20 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xb2640, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:20 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspLus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/38, @ANYPTR, @ANYBLOB="0100"/24], 0x46}, 0x0) 22:14:20 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mic/\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x3) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0xfffffffffffffee5) 22:14:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x100000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000040)=""/222, &(0x7f0000000140)=0xde) 22:14:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/38, @ANYPTR, @ANYBLOB="0100"/24], 0x46}, 0x0) 22:14:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x200000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:20 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspPus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:20 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mic\\\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x20000000289, 0x200080) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000040)={0x7f}) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/38, @ANYPTR, @ANYBLOB="0100"/24], 0x46}, 0x0) 22:14:20 executing program 1: socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x300000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x15, 0x0, &(0x7f0000000040)) socket$inet(0x2, 0x20080003, 0xb2) 22:14:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/39, @ANYPTR, @ANYBLOB="0100"/24], 0x47}, 0x0) 22:14:20 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x02', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:20 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspXus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7fffffff, 0x400000) readlinkat(r2, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)=""/24, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) close(r2) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/39, @ANYPTR, @ANYBLOB="0100"/24], 0x47}, 0x0) 22:14:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x400000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 22:14:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/39, @ANYPTR, @ANYBLOB="0100"/24], 0x47}, 0x0) 22:14:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002840)='/dev/vcs\x00', 0x20200, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000002880)={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1}, 0x8) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:21 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x03', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp\\us\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x500000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x24000) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000040)={0x2, 0x5, 0xffffffffffffff1c}) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:21 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fd7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)) 22:14:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000140)=""/172) 22:14:21 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x04', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspuus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:21 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x14) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000040)=0x9) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x1, 0x2) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000000440)=[0xee01, 0xee01, 0x0, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000480)={0xa0, 0x0, 0x2, {{0x2, 0x2, 0x7123, 0xffff, 0x6, 0x4, {0x0, 0x4, 0x8, 0x800, 0x89, 0x2, 0x7551, 0x1, 0x1000, 0x2, 0x14000000, r2, r4, 0x6, 0x40}}, {0x0, 0x2}}}, 0xa0) r5 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7, 0x4000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r7 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0xfffffe99) r8 = socket$inet(0x2, 0x3, 0x17) ioctl$ION_IOC_HEAP_QUERY(r5, 0xc0184908, &(0x7f0000000580)={0x34, 0x0, &(0x7f0000000540)}) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@empty}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$sock_int(r7, 0x1, 0xa, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYRES32=r3, @ANYRES16=r9, @ANYBLOB="000325bd7000fddbdf25080000000800040000010000080004002203000008000400f9ffffff3c00030014000600fe8000000000000000000000000000bb14000600ff010000000000000000000000000001080007004e2300000800040007000000340003001400020073797a6b616c6c657230000000000000080007004e24000014000200687773696d30000000000000000000000800060009000000"], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_bridge\x00', 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x0) 22:14:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x600000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:21 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40001, 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) connect$l2tp(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x4, 0x4, 0x4, {0xa, 0x4e23, 0x3, @mcast1, 0x400}}}, 0x3a) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x1) pwrite64(r2, &(0x7f0000000040)="2dbc73f4fac8b3f0bc91f18283ad77648e", 0x11, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:21 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x05', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl\ns\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x800000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:21 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f00000000c0)={[{@nolazytime='nolazytime'}, {@data_ordered='data=ordered'}]}) 22:14:21 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x2) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:21 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x06', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x900000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl#s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @null, 0xfffffffffffffbff, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) r2 = socket$inet(0x2, 0x5, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000140)="437fe61b06ec28fd53fe22a7176838e1931f288e7d1e760e0c6a7be1b4553aa3be9eb36e8e7ded41ec6aa27cc51d1b67e5681d40bf2c6750a6a41404abb0a60c8c8fdb36da6e996a7a095aeb7948da9e32ead03a2fd7fcd0c418318859309271a8ac46bdab071a69d72e9c67bd214eb5") getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) [ 428.683668][ T8085] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option 22:14:22 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\a', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 428.743708][ T8085] EXT4-fs (sda1): re-mounted. Opts: nolazytime,data=ordered, 22:14:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x0, 0x2, 0x2}, 0x80}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 22:14:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000080)={0x0, 0xa, 0x6, &(0x7f0000000040)=0x48e6f0c8}) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xa00000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 428.848474][ T8344] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 428.879062][ T8344] EXT4-fs (sda1): re-mounted. Opts: nolazytime,data=ordered, 22:14:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl%s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, 0x0) dup2(r1, r0) 22:14:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000001, 0x200000) getpeername(r2, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0xf18d6c61d086307f) statx(r3, &(0x7f0000000340)='./file0\x00', 0x4400, 0x209, &(0x7f0000000480)) recvfrom$packet(r3, &(0x7f0000000140)=""/187, 0xbb, 0x40010022, &(0x7f00000002c0)={0x11, 0x8, r4, 0x1, 0x7}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r2}) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000300)={0x9, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) 22:14:22 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) recvfrom(r0, &(0x7f00000000c0)=""/98, 0x62, 0x10000, &(0x7f0000000200)=@can={0x1d, r1}, 0x80) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000300)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x2000, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000001880)='/dev/dmmidi#\x00', 0x0, 0x2000) write$P9_RSTATFS(r2, &(0x7f0000000340)={0x43, 0x9, 0x1, {0x7d, 0x2b8, 0xf176, 0x4, 0x7f6e, 0x800, 0x7fff, 0x9a7, 0x8}}, 0x43) setsockopt$inet6_tcp_int(r2, 0x6, 0x18, &(0x7f0000000440)=0x6, 0xfffffffffffffea7) sync_file_range(r3, 0x9, 0xfffffffffffffe00, 0x2) write$P9_RAUTH(r4, &(0x7f0000000000)={0xfffffffffffffebd, 0x67, 0x1, {0x10, 0x2, 0xffffffffffffffff}}, 0xfffffffffffffcf5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:22 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\b', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xb00000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl*s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:22 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 22:14:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000040)) getsockopt$inet_buf(r1, 0x0, 0x10, &(0x7f0000000080)=""/156, &(0x7f0000000140)=0x9c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000180)={0xb4b9}, 0x1) flistxattr(0xffffffffffffffff, 0x0, 0x0) 22:14:22 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20040, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x4, @rand_addr="56a44f70c7bd9f1635c25b808e9ccae2", 0x7}, @in6={0xa, 0x4e20, 0x1, @local, 0x3f}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}], 0x58) 22:14:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xc00000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fdatasync(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000100)) flistxattr(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x0) accept(r0, &(0x7f0000000040)=@sco, &(0x7f00000000c0)=0x80) 22:14:22 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x14, 0x800) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4002}, 0x326, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r2, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0xc840}, 0x4004000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl+s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, 0x0, 0x0) 22:14:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xe00000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 429.573223][ T9342] EXT4-fs (sda1): can't enable nombcache during remount 22:14:23 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:23 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x8000, 0x9, 0x3f, 0x8, 0x9, 0x5, 0xf4, {0x0, @in={{0x2, 0x4e20, @multicast2}}, 0xadb, 0xffffffff, 0x7fffffff, 0x7f, 0x1}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r2, 0x5}, &(0x7f00000001c0)=0x8) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:23 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(r0, 0x0, 0x263) r2 = accept4(r0, &(0x7f0000000180)=@ax25={{0x3, @netrom}, [@netrom, @bcast, @null, @bcast, @null, @netrom, @default, @netrom]}, &(0x7f0000000040)=0x80, 0x800) getsockname$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xfffffffffffffffd, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x8000, 0x0) getsockopt(r3, 0x0, 0x7, &(0x7f0000000240)=""/4096, &(0x7f0000001240)=0x1000) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) [ 429.685587][ T9493] EXT4-fs (sda1): can't enable nombcache during remount 22:14:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl-s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:23 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf00000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:23 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x3) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f0000000000)) 22:14:23 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000100)={'ip_vti0\x00', {0x2, 0x4e24, @local}}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1f, &(0x7f00000001c0)=""/240, 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r2, 0x0) recvmmsg(r2, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x277, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) shmget(0x2, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 22:14:23 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1000000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:23 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10, 0x800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x8000, @remote, 0x2}}, [0x8, 0x7fffffff, 0x1, 0x40, 0x49, 0x0, 0x5, 0xe7e, 0x0, 0xca0, 0x401, 0x6, 0x39c, 0x3, 0x1]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e22, 0x0, @loopback, 0x9}}, 0x9, 0x4, 0x100000000, 0x1, 0xc6c3}, &(0x7f0000000300)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000340)=@assoc_value={r3, 0xbe}, &(0x7f0000000380)=0x8) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000003c0)) r4 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl.s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) [ 430.006964][ T9728] EXT4-fs (sda1): can't enable nombcache during remount 22:14:23 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1100000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:23 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)=0xfffffffffffffd4a) 22:14:23 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 430.333979][T10120] EXT4-fs (sda1): can't enable nombcache during remount 22:14:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1200000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl0s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:23 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x10000) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000300)={0x0, 0x5}) 22:14:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x80005, 0xfe) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1300000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:24 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplXs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) [ 430.702844][T10645] EXT4-fs (sda1): can't enable nombcache during remount 22:14:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x1400000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.upper\x00', &(0x7f0000000080)='wlan0\x00', 0x6, 0x2) 22:14:24 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:24 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x1000000000000016, &(0x7f0000000200)) ptrace(0x10, r0) ptrace$getregset(0x21, r0, 0x0, 0x0) ptrace(0x8, r0) process_vm_readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/106, 0x6a}, {&(0x7f0000000100)=""/23, 0x17}, {&(0x7f0000000140)=""/102, 0x66}, {&(0x7f0000000280)=""/214, 0xd6}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/31, 0x1f}, {&(0x7f00000003c0)=""/131, 0x83}, {&(0x7f0000000480)=""/18, 0x12}, {&(0x7f00000004c0)=""/30, 0x1e}, {&(0x7f0000000500)=""/215, 0xd7}, {&(0x7f0000000600)=""/109, 0x6d}, {&(0x7f0000000680)=""/41, 0x29}], 0x7, 0x0) 22:14:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:24 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:24 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x4000000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl\\s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@locktable={'locktable', 0x3d, 'suiddir'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 22:14:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000140)={0x1d, "0c4d299e4d4f6e5f090d9a5e946a1f18a5da2e1b05393b257b21de88099b84d5802d6e9a1b77df2cc86f5b960a49789f77224239d23eb21c71608f122e6f377c7b856bf9aa14e4d80a3191d5fe9b2f55d4c66ee4eb56eaa2de1e583a7b68d5b5850e3b572ff151934b065d0061c58945a2122c29993137750b689b1133e48283"}) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:24 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6000000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x2000) ioctl$TIOCSBRK(r1, 0x5427) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) r2 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) ioctl$TIOCSBRK(r1, 0x5427) accept$netrom(r1, 0x0, &(0x7f0000000080)) 22:14:24 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 431.382688][T11356] gfs2: not a GFS2 filesystem 22:14:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplcs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x277, 0x0, 0x0) 22:14:24 executing program 5: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6558000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:25 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x288002, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESDEC=r0, @ANYBLOB="ca5958e91ee7b643ccd85927436aa77d6d0e2433f23b974119d4332bfd9801bee306e702b8042ff071cab9f647cb7db1c2", @ANYRES32, @ANYPTR, @ANYBLOB="996613f2195c1392c8500cda86703a8250d597d5ab23602d1d4dd76ea85cadfb41a51f71f0fa801d6b262773bd6abd03a095aa5ec5ee7c53491c919b83bf5c711e456d367f72ba37001112953e770b66e658001e926e50adf8626b3f5d897edfcb1c34f19fec1301567a8e8ec11e"], @ANYRES16=r0, @ANYBLOB="7957e5cf8c6d5d76038ac4b0cf327ea1a71cd0e18b361aded01be392a6b313dd330b6517485da8623f5e8c9afc1a4239f25d85aa1bb524fe18d358799fba467d70c4c507f855d33e20873694a2f18377ed5afb8417cac9dcd513", @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="ca3bfcea2ee8ba170c1892473d139a544a5c8c665fae5a114cc7280f8a5aefe99509ea64e7637d8d759383f7e28f7903f2bc2b1b1939dbaf4a406ea23246453c37243ab15e7c591b030d2eaef18fed3b29a9e098d94974367a1e42e4881bc52d04094d3c04e23c862c7c0aa3170ccf96ef461dff1a23fef549f490be2c164796f0a1332610a054d3d2446ce49a0f2a2d1f12df4cbd97dd814a964277f4e3135211f486442e19a6150ded3ebea56f44bda6e9b1277b89fbbb2174e53dc954fcab7093aed7b6de2c0f67db32", @ANYRES16=0x0, @ANYPTR, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYRES64=r0], @ANYBLOB="d6ad29ed73f0cdb017bdccc5e32b95f53fcfcc433afa0b3f57d53402123426a63a7c30bc66b1a2ae6eb31a914dd265370e0bd5783a0fe24e2ea0", @ANYRESOCT=r0, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRES16=r0, @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRES64, @ANYRES32=r0, @ANYRESOCT=r0, @ANYPTR], @ANYRES32, @ANYRES64=r0, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR, @ANYRESDEC=r0, @ANYRES16=r0]]], 0x1, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x15, 0x0, &(0x7f00000000c0)) ioctl$VFIO_IOMMU_MAP_DMA(r1, 0x3b71, &(0x7f0000000140)={0x20, 0x2, 0x74, 0x9, 0x80000000}) 22:14:25 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:25 executing program 5: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x6f15000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) [ 431.757950][T11898] QAT: Invalid ioctl 22:14:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplds\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) [ 431.794549][T11942] QAT: Invalid ioctl 22:14:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r2 = epoll_create1(0x800000000000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = gettid() rt_sigprocmask(0x0, &(0x7f0000057ff8)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r3}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) r4 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) link(0x0, &(0x7f0000000280)='./file0\x00') setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000100)={0x0, 0xa4d6}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 22:14:25 executing program 5: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x8100000000000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x15, 0x0, &(0x7f00000000c0)) personality(0x0) 22:14:25 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplis\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:25 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000240)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200840, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) connect(r0, &(0x7f0000000180)=@hci={0x1f, r1, 0x3}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x5, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) link(0x0, &(0x7f0000000280)='./file0\x00') setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000100)={0x0, 0xa4d6}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 22:14:25 executing program 5: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x88a8ffff00000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getgid() setgid(r2) r3 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x15, 0x0, &(0x7f00000000c0)) sendfile(r0, r1, 0x0, 0xffffffffffffffc1) 22:14:25 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplls\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f0000000140)) r4 = getgid() fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r8 = getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getgroups(0x2, &(0x7f00000004c0)=[0x0, 0xffffffffffffffff]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) getgroups(0x6, &(0x7f0000000640)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0]) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700), &(0x7f0000000740)=0x0, &(0x7f0000000780)) write$FUSE_DIRENTPLUS(r2, &(0x7f00000007c0)={0x3e0, 0x0, 0x5, [{{0x1, 0x2, 0x0, 0xfc0c, 0x5, 0xbcd, {0x1, 0x7, 0x7fffffff, 0xffc7, 0x0, 0x9d, 0x1, 0xda5b, 0x5, 0x9, 0x4, r3, r4, 0x4, 0x1c5}}, {0x5, 0xffffffffffff7fff, 0x6, 0x4, 'md5sum'}}, {{0x2, 0x1, 0x3, 0x4, 0xb9b, 0x3f, {0x4, 0x3f, 0x3ff, 0x5b19, 0x1, 0x5, 0x9, 0x2, 0x80000001, 0x5, 0x401, r5, r6, 0x3ff, 0x8001}}, {0x5, 0x8, 0x16, 0xda99, ']-nodev&md5sum\\:md5sum'}}, {{0x0, 0x1, 0x8, 0x5, 0xd87c, 0x4, {0x5, 0x2, 0x100000000, 0x100000001, 0x8, 0xfffffffffffffffb, 0x7ff, 0x400, 0x2, 0x5, 0x1ff, r7, r8, 0x8, 0x3ff}}, {0x6, 0x7, 0x8, 0x1000, '}]{wlan0'}}, {{0x5, 0x0, 0x200, 0x10000, 0xc4d, 0x800, {0x1, 0x80000001, 0x100, 0x1ff, 0x2, 0x9, 0xbb2, 0x40, 0x4081, 0x4, 0x100000001, r9, r10, 0x3, 0x8}}, {0x3, 0x20, 0x18, 0x5, '@^)}vmnet1(vmnet1cpuset+'}}, {{0x1, 0x2, 0x4, 0x8fb2, 0x2, 0x2, {0x2, 0x100, 0xffffffc000000000, 0x1, 0xd1a7, 0x0, 0xd55e, 0x0, 0x5, 0x2, 0x73b8, r11, r12, 0x6, 0x10000}}, {0x1, 0x40, 0x0, 0x40}}, {{0x0, 0x0, 0x200, 0x55, 0x8000000000, 0xff, {0x5, 0x0, 0x7, 0x5, 0x8, 0x5, 0x9, 0x9, 0x9, 0xb19, 0x6, r13, r14, 0x4, 0x5}}, {0x2, 0x7, 0x0, 0x2}}]}, 0x3e0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r15 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r15, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:25 executing program 5: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) link(0x0, &(0x7f0000000280)='./file0\x00') setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000100)={0x0, 0xa4d6}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 22:14:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x9effffff00000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:26 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000009c0)=@broute={'broute\x00', 0x20, 0x6, 0x85c, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, &(0x7f0000000080), &(0x7f0000000140)=ANY=[@ANYBLOB="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"]}, 0x8d4) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000040), 0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 22:14:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplos\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xf0ffffff00000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:26 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:26 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1f, 0x402000) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$KVM_GET_PIT(r3, 0xc048ae65, &(0x7f0000000040)) connect$rose(r3, &(0x7f0000000140)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) r4 = socket$inet(0x2, 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x15, 0x0, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000240)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000280)={r5, r6}) 22:14:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x277, 0x0, 0x0) 22:14:26 executing program 5: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) [ 432.959313][T12988] QAT: Invalid ioctl 22:14:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xffffff7f00000000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplps\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:26 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:26 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0}}], 0x277, 0x0, 0x0) 22:14:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xfffffffffffff000, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:26 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:26 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplss\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:27 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:27 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer2\x00', 0x0, 0x0) 22:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), 0x0) 22:14:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:27 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), 0x0) 22:14:27 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplxs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), 0x0) 22:14:27 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockname$netlink(r1, &(0x7f0000000080), 0x0) 22:14:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu\n\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockname$netlink(r1, &(0x7f0000000080), 0x0) 22:14:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:27 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:27 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockname$netlink(r1, &(0x7f0000000080), 0x0) 22:14:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:27 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:14:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu#\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:28 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:14:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:28 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:28 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu%\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:28 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:14:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:28 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:28 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup3(r0, 0xffffffffffffffff, 0x0) getsockname$netlink(r1, &(0x7f0000000080), 0x0) 22:14:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:28 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup3(r0, 0xffffffffffffffff, 0x0) getsockname$netlink(r1, &(0x7f0000000080), 0x0) 22:14:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu*\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:28 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:28 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:28 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup3(r0, 0xffffffffffffffff, 0x0) getsockname$netlink(r1, &(0x7f0000000080), 0x0) 22:14:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu+\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:28 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:29 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\xff', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:29 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:29 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, &(0x7f0000001340)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:29 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}, {@lazytime='lazytime'}]}) 22:14:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, &(0x7f0000001340)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:29 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\xf6', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, &(0x7f0000001340)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:29 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, 0x0) 22:14:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu.\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) [ 436.384080][T15979] EXT4-fs (sda1): re-mounted. Opts: 22:14:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:29 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:29 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, 0x0) 22:14:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu/\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) [ 436.646303][T16197] EXT4-fs (sda1): re-mounted. Opts: 22:14:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0xb, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:30 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, 0x0) 22:14:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:30 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0xb, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 436.934787][T16516] EXT4-fs (sda1): re-mounted. Opts: 22:14:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:30 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}, {@nombcache='nombcache'}]}) 22:14:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0xb, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:30 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspluX\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x10, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 437.197571][T16723] EXT4-fs (sda1): can't enable nombcache during remount 22:14:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:30 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}]}) 22:14:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x10, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x10, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu\\\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) [ 437.451451][T16878] EXT4-fs (sda1): re-mounted. Opts: stripe=0x0000000000000000, 22:14:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:30 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:30 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}]}) 22:14:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x13, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspluc\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) [ 437.714737][T17121] EXT4-fs (sda1): re-mounted. Opts: stripe=0x0000000000000000, 22:14:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x13, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:31 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@stripe={'stripe'}}]}) 22:14:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:31 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) [ 437.933000][T17373] EXT4-fs (sda1): re-mounted. Opts: stripe=0x0000000000000000, 22:14:31 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@nombcache='nombcache'}]}) 22:14:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplud\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x13, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) [ 438.167675][T17607] EXT4-fs (sda1): can't enable nombcache during remount 22:14:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x14, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c235"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplui\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:31 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:31 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@nombcache='nombcache'}]}) 22:14:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x14, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c235"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 438.436621][T17824] EXT4-fs (sda1): can't enable nombcache during remount 22:14:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x14, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c235"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:31 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000100)={[{@nombcache='nombcache'}]}) 22:14:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplul\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:32 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x15, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) [ 438.704597][T18043] EXT4-fs (sda1): can't enable nombcache during remount 22:14:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x15, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockname$netlink(r1, &(0x7f0000000080), 0x0) 22:14:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspluo\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:32 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x11, 0x5) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105500, 0x0) 22:14:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x15, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockname$netlink(r1, &(0x7f0000000080), 0x0) 22:14:32 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:32 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x41) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)="27aeff34", 0x4}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) 22:14:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f234969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockname$netlink(r1, &(0x7f0000000080), 0x0) 22:14:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplup\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:32 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, 0xffffffffffffffff, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f234969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 439.238624][ T2481] blk_update_request: I/O error, dev loop0, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 439.254104][ T2481] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 439.262604][ T2481] blk_update_request: I/O error, dev loop0, sector 8 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 22:14:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 439.281374][ T2481] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 439.289978][ T2481] blk_update_request: I/O error, dev loop0, sector 16 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 439.301421][ T2481] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 439.325616][ T2482] blk_update_request: I/O error, dev loop0, sector 24 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 439.337020][ T2482] Buffer I/O error on dev loop0, logical block 3, lost async page write 22:14:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f234969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, 0xffffffffffffffff, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:32 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x41) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)="27aeff34", 0x4}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) 22:14:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f23496999"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspluu\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, 0xffffffffffffffff, 0x0) getsockname$netlink(r2, &(0x7f0000000080), 0x0) 22:14:33 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 439.724740][ T2482] blk_update_request: I/O error, dev loop0, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 439.736415][ T2482] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 439.745484][ T2482] blk_update_request: I/O error, dev loop0, sector 8 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 439.757303][ T2482] Buffer I/O error on dev loop0, logical block 1, lost async page write 22:14:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f23496999"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 439.766507][ T2482] blk_update_request: I/O error, dev loop0, sector 16 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 439.777758][ T2482] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 439.786306][ T2482] blk_update_request: I/O error, dev loop0, sector 24 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 439.797595][ T2482] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 439.806050][ T2482] blk_update_request: I/O error, dev loop0, sector 32 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 22:14:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup3(r1, r0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), 0x0) 22:14:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 439.817305][ T2482] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 439.825765][ T2482] blk_update_request: I/O error, dev loop0, sector 40 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 439.837070][ T2482] Buffer I/O error on dev loop0, logical block 5, lost async page write 22:14:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x1b, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000180)) 22:14:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f23496999"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup3(r1, r0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), 0x0) 22:14:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplux\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:33 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup3(r1, r0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), 0x0) 22:14:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x1b, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000180)) 22:14:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = dup3(r1, r0, 0x0) getsockname$netlink(r2, 0x0, 0x0) 22:14:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x02', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x1b, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000180)) 22:14:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:33 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:33 executing program 2: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x223, 0x200007fa, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x7000, 0x40, &(0x7f0000ff7000/0x7000)=nil) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 22:14:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x1b, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000180)) 22:14:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1bc) 22:14:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x1b, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:34 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:34 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) link(0x0, &(0x7f0000000280)='./file0\x00') syz_open_dev$sg(0x0, 0x0, 0x400001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000040)) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@loopback, @in6=@loopback, 0x4e22, 0x0, 0x4e23, 0x0, 0xa, 0x0, 0xa0}, {0x7, 0x1000, 0x9, 0x0, 0x8, 0x9, 0x3a, 0x5}, {0x0, 0x2800000}, 0x1d83, 0x6e6bb9, 0x2, 0x0, 0x1}, {{@in=@rand_addr=0x62, 0x4d2}, 0xa, @in=@remote, 0x0, 0x0, 0x2, 0x9, 0x0, 0x0, 0x1}}, 0xe8) truncate(&(0x7f0000000200)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40fdf) syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, 0x0) 22:14:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x04', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:34 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x2, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x16, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e9ffffff0000000000000000850000005700000095000000000000000df1677944bc284ebe82df0f9d5f2e6bc9abb8181d5fef187b54395de26e0f0a7d2635210a1b5fdbd9f8af590d76c8fd9e9427beecda0bbae0908d1ad47de6fc3c57868c320f4eb44692bd9c24f001a7fc8ab2097fe19555e9362a46e245e1e550082a50b769020478430e23bd3ccaf6ef5277c61288cd16f4441b27378b4e566375094281c23598d10594393f2349699969"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:34 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x3, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:35 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) link(0x0, &(0x7f0000000280)='./file0\x00') syz_open_dev$sg(0x0, 0x0, 0x400001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000040)) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@loopback, @in6=@loopback, 0x4e22, 0x0, 0x4e23, 0x0, 0xa, 0x0, 0xa0}, {0x7, 0x1000, 0x9, 0x0, 0x8, 0x9, 0x3a, 0x5}, {0x0, 0x2800000}, 0x1d83, 0x6e6bb9, 0x2, 0x0, 0x1}, {{@in=@rand_addr=0x62, 0x4d2}, 0xa, @in=@remote, 0x0, 0x0, 0x2, 0x9, 0x0, 0x0, 0x1}}, 0xe8) truncate(&(0x7f0000000200)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40fdf) syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, 0x0) 22:14:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x69, 0x1b, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x05', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x69, 0x1b, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:35 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x4, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4620, @multicast2}, 0x10) 22:14:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x69, 0x1b, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:35 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0xb701) 22:14:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x06', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:35 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x5, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg$inet(r1, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001940)="a5b74325f4900180add55fa056c0604f681902218d2caea28c46112d59161fb7ad49a51f0e8e35bccd828c5ae2581cb68c97dd8861a8999cd733184c7c8ca9138ad4fd6b344e4ac18311b2051e3e70f48aa3f23a8243fc591c1683267408124e52cd3b78e71aea4d8e0a4143b727fb72caae99ab144482fce2ee516df04b5ad133fba6ed4b8bd344784168814e2dfbd245884315ae6d3ab3917fd63fc40df0844246c026d6934c6e0c0ea9eca6daa6446161e7af3a2e9d09cb2213e94fd8a226135878c300f448f2dd", 0xc9}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="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", 0x1fb0, 0x9, 0x0, 0x0) 22:14:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\a', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:35 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) rt_sigprocmask(0x2, 0x0, 0x0, 0xffffffffffffff94) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000003, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000000040)) recvmsg(r2, &(0x7f0000172fc8)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') futimesat(0xffffffffffffffff, 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x4) dup2(r1, r2) r3 = gettid() tkill(r3, 0x16) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 22:14:35 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x6, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\b', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:36 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x7, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x0, &(0x7f00000000c0)) 22:14:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\n', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x69, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:39 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x8, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:39 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) syz_open_dev$sg(0x0, 0x0, 0x400001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xab3}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81806) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@initdev, @in=@loopback}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000940)=0xe8) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x40fdf) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2001, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, 0x0) [ 445.868342][T21603] tracefs: Unknown parameter 'devtmpfs /dev devtmpfs rw' [ 445.905396][T21640] tracefs: Unknown parameter 'devtmpfs /dev devtmpfs rw' 22:14:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x0, &(0x7f00000000c0)) 22:14:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:39 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x300, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 446.154812][T21838] tracefs: Unknown parameter 'devtmpfs /dev devtmpfs rw' 22:14:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x0, &(0x7f00000000c0)) 22:14:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:39 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x500, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusH', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:39 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) syz_open_dev$sg(0x0, 0x0, 0x400001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xab3}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x81806) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@initdev, @in=@loopback}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000940)=0xe8) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x40fdf) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2001, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, 0x0) [ 446.365135][T22045] tracefs: Unknown parameter 'devtmpfs /dev devtmpfs rw' 22:14:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x0, &(0x7f00000000c0)) 22:14:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusL', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:40 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x600, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) [ 446.577647][T22214] tracefs: Unknown parameter 'devtmpfs /dev devtmpfs rw' 22:14:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, 0x0) 22:14:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 22:14:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) 22:14:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus`', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:40 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000b40)=0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be254", 0x32}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4e", 0x4b}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)}], 0x7, &(0x7f0000000840)=[{0xd0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68"}, {0x50, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x180}}], 0x1, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3a0100002901000600000002000000000000000000000000df00000000000000074d00131377c5fc35d41454ecd41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f"], 0x70) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) 22:14:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:40 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x700, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) 22:14:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplush', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:40 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000b40)=0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be254", 0x32}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4e", 0x4b}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)}], 0x7, &(0x7f0000000840)=[{0xd0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68"}, {0x50, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x180}}], 0x1, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3a0100002901000600000002000000000000000000000000df00000000000000074d00131377c5fc35d41454ecd41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f"], 0x70) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) 22:14:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:40 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x3f00, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusl', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:40 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000b40)=0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be254", 0x32}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4e", 0x4b}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)}], 0x7, &(0x7f0000000840)=[{0xd0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68"}, {0x50, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x180}}], 0x1, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3a0100002901000600000002000000000000000000000000df00000000000000074d00131377c5fc35d41454ecd41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f"], 0x70) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) 22:14:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:40 executing program 2: r0 = syz_open_procfs(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) 22:14:41 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x4000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplust', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000040)={'bond0\x00\x00\x19\x02\x00\x00\x00\x00?\x00', @ifru_names='bond0\x00'}) 22:14:41 executing program 2: r0 = syz_open_procfs(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) 22:14:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:41 executing program 2: r0 = syz_open_procfs(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) 22:14:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xa) 22:14:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusz', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:41 executing program 2: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) 22:14:41 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0xff00, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xa) 22:14:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:41 executing program 2: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) 22:14:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:41 executing program 2: syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) 22:14:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000280)="aab628ac45ea9d90187d0d4027f005e42337c523670437f392588bf869a31d910f9b38fccf560a5bdb2ff3fb5931e759a590d4d2f393548f") ptrace$getsig(0x4202, 0x0, 0x0, 0x0) ptrace$cont(0x9, r0, 0xffffffff, 0xdb) clone(0x8840000, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000040)={0x406}, 0xfdef) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x8, 0x70bd2d, 0x0, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8}}, ["", ""]}, 0x24}}, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10000, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) [ 448.189569][T23804] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 22:14:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, 0x0, 0x0) [ 448.253725][T23814] hfsplus: type requires a 4 character value [ 448.277951][T23814] hfsplus: unable to parse mount options 22:14:41 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x1000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 448.334174][T23920] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 22:14:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)={0x57, 0x7fffffff, 0xd2, {}, {}, @cond}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 448.483842][T24029] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 22:14:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:42 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:42 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x2000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 448.799751][T24289] hfsplus: type requires a 4 character value [ 448.824758][T24289] hfsplus: unable to parse mount options 22:14:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000ec0)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000f00)={r1, 0x32c, "1e95a9a4e197ca3c130faf7fcb71bbd06700774813fdec45ea942ef245f8d133df7a4906f3d551f49ab73f2c8190617762412f22e9aed7a2b6f19f8255c8fe2ba671b0b3f7e3081e05f58d4fc26294ee5a41791a3237d16ad4165105241ca89b5d420453f995ae0ea1954a568ac6399c9e72ac338963bb98d2798e1b9a480df131ef52d559e15936efaca1eb1936269304960cd1e005f23cbad605c131ffe69fc3bbc532b78073ca80958997af62a3c498b7ac6406fe67d264b709d17ee0170f338c42f93c54e17153121a3f289c912d4479b4174cd879f2ffc4754a456a41aa6179e29e260030adf049384ebf4fa1fbf771b5868ed90da448504e13586bd75e27323ab6fe3163b859635801437d3e58a24e87e467927a9601153c22ff6bb06de14dcbf9158a76443b4483a5c39109bbb8c362e603a6470f7f0a597165ec7a596acb2f677bd255c08c00b3f246bcdee3a111eb566d9124feebfb96eb8dbce6720ccaaf93282c0a010ec80ae86e50cfddbd99eb6ad47de039cce1c12aad715f713951223fd4cc4f2e238b0b915688daae501cd88aa6fefbf58d71f0f3d36891a890d3e8f7bc6a90f147e59dbebe5cbad62f053200e754c859dfe38373ea7d2967e15a2349d48cc2c1bf7a80aabcb2f724e0f792417d3c879e07ebd2515046ec40545f4b2d0fcde1e4c4cf171c2fe20b8674586ebdbf40fe6b2024abd93fce970ff7c13ed7f8d60e7262b2202dd3c473ef795b3acbd3d1c66b6706c7b2fdb9993ce03d243fcd67d4a6a848d79cec9d2992002653cd1fe2f7f5a64c28500f664261c434d496d85f71bedc884b68c23b8d6c3416167eb5b1322e4039e378c9ed38fc784ab5ccee38ce370d9a7b625d498d4d738413c3901572f4963cba4fe04084ae57079fdf3f26727af00b0d43bb0fe9c2b269730bedab6f0520c30d605a54b4801f01cfcf6eae1c01eb1bc1b3556857ecea0aee1b2f8dd5650898eac1db67f8171933592c95966269ee2a3a0d3a2319c8da8e8dadad9025953a4d961bf3caa3291433cceb23d773764ba8d7ec8776d9f1d761302c3301099bbbca90481c1681cf423a8a253e320a7e01a9bc5a3ce29330c6a32545d660a972296c849f0eebd4a67cbc54761fb542197d8246f0"}, &(0x7f0000000040)=0x334) 22:14:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:42 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x127) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:42 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:42 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x3000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fcff", 0x58}], 0x1) 22:14:42 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') read$eventfd(r0, &(0x7f0000000100), 0x8) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x0, &(0x7f00000000c0)) [ 449.078851][T24484] hfsplus: type requires a 4 character value [ 449.114456][T24484] hfsplus: unable to parse mount options 22:14:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:42 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x127) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, 0x0, 0x0) [ 449.178540][T24570] tracefs: Unknown parameter ' /dev devtmpfs rw' [ 449.215269][T24602] tracefs: Unknown parameter './file0' 22:14:42 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000540)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x1, 0x0, &(0x7f0000000040)="c1"}) 22:14:42 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:42 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x4000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, 0x0, 0x0) 22:14:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, 0x0, 0x0) 22:14:42 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x127) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) [ 449.418433][T24786] hfsplus: type requires a 4 character value [ 449.456721][T24786] hfsplus: unable to parse mount options 22:14:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200), 0x0) 22:14:43 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x5000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:43 executing program 2: 22:14:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus ', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200), 0x0) 22:14:43 executing program 2: 22:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200), 0x0) 22:14:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:43 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x127) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:43 executing program 2: 22:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{0x0}], 0x1) 22:14:43 executing program 2: 22:14:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:43 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x6000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{0x0}], 0x1) 22:14:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:43 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x127) renameat2(0xffffffffffffffff, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{0x0}], 0x1) [ 450.105510][T25333] hfsplus: type requires a 4 character value [ 450.126124][T25333] hfsplus: unable to parse mount options 22:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)}], 0x1) 22:14:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:43 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x127) renameat2(0xffffffffffffffff, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(authenc(crc32-generic,ctr-camellia-aesni-avx2))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) 22:14:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:43 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x7000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)}], 0x1) 22:14:43 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x127) renameat2(0xffffffffffffffff, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)}], 0x1) 22:14:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:44 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x8000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:44 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f640094000500", 0x2c}], 0x1) 22:14:44 executing program 2: 22:14:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) [ 450.646781][T25854] hfsplus: type requires a 4 character value 22:14:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f640094000500", 0x2c}], 0x1) [ 450.696391][T25854] hfsplus: unable to parse mount options 22:14:44 executing program 2: 22:14:44 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f640094000500", 0x2c}], 0x1) 22:14:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:44 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x3f000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:44 executing program 2: [ 450.975161][T26109] hfsplus: type requires a 4 character value 22:14:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000", 0x42}], 0x1) 22:14:44 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 451.015774][T26109] hfsplus: unable to parse mount options 22:14:44 executing program 2: 22:14:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000", 0x42}], 0x1) 22:14:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:44 executing program 2: 22:14:44 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x40000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:44 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000", 0x42}], 0x1) 22:14:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:44 executing program 2: [ 451.302969][T26407] hfsplus: type requires a 4 character value [ 451.308983][T26407] hfsplus: unable to parse mount options 22:14:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002", 0x4d}], 0x1) 22:14:44 executing program 2: 22:14:44 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002", 0x4d}], 0x1) 22:14:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:44 executing program 2: [ 451.525736][T26644] hfsplus: type requires a 4 character value [ 451.577803][T26644] hfsplus: unable to parse mount options 22:14:45 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0xf6ffffff, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:45 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002", 0x4d}], 0x1) 22:14:45 executing program 2: 22:14:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:45 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:45 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900", 0x53}], 0x1) 22:14:45 executing program 2: 22:14:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:45 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:45 executing program 2: [ 451.857358][T26918] hfsplus: type requires a 4 character value [ 451.869339][T26918] hfsplus: unable to parse mount options 22:14:45 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0xff000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900", 0x53}], 0x1) 22:14:45 executing program 2: 22:14:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900", 0x53}], 0x1) 22:14:45 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:45 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') fremovexattr(r0, &(0x7f0000000040)=@random={'user.', '-vmnet1bdev*-\x00'}) 22:14:45 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:45 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af23, 0x0) 22:14:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004", 0x56}], 0x1) 22:14:45 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 452.193706][T27192] hfsplus: type requires a 4 character value [ 452.220523][T27192] hfsplus: unable to parse mount options 22:14:45 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0xfffffff6, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:45 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004", 0x56}], 0x1) 22:14:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:45 executing program 2: 22:14:45 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) [ 452.509371][T27446] hfsplus: type requires a 4 character value [ 452.540395][T27446] hfsplus: unable to parse mount options 22:14:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004", 0x56}], 0x1) 22:14:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:46 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x1000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:46 executing program 2: 22:14:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fc", 0x57}], 0x1) 22:14:46 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:46 executing program 2: 22:14:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fc", 0x57}], 0x1) [ 452.835146][T27727] hfsplus: type requires a 4 character value [ 452.874491][T27727] hfsplus: unable to parse mount options 22:14:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:46 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:46 executing program 2: 22:14:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000004fc", 0x57}], 0x1) 22:14:46 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x100000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)=0x88) 22:14:46 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can={0x1d, r0}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000580)={0x20071026}, &(0x7f0000001ac0)) 22:14:46 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x11, 0x5) ioctl$FS_IOC_FSGETXATTR(r0, 0xc00c5512, &(0x7f0000000180)={0xa1}) 22:14:46 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) [ 453.226670][T28054] hfsplus: type requires a 4 character value [ 453.266314][T28054] hfsplus: unable to parse mount options 22:14:46 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4003) close(r0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") execve(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000100)='\x00'], 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000400)=[&(0x7f0000000300)='=lan1}\x00']) 22:14:46 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x200000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 453.293814][T28145] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure 22:14:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xc0', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:46 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000580)={0x20071026}, &(0x7f0000001ac0)) 22:14:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 22:14:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:47 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:47 executing program 2: syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x40000) 22:14:47 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x300000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 453.663108][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:14:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:47 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:47 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/g\\oup.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\x8b\xe8\xaba\x98P\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXY>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W_\xb6\xe4\x8d\xba\xee\b\xeb\x8e\xd8[T|i$\x88\x04\t\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0', 0x2761, 0x0) [ 453.863333][T28698] hfsplus: type requires a 4 character value [ 453.882618][T28698] hfsplus: unable to parse mount options 22:14:47 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:47 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:47 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x400000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:47 executing program 2: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40505331, &(0x7f0000000080)) 22:14:47 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000014000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 454.196092][T29013] hfsplus: type requires a 4 character value 22:14:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:47 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x770a, 0x0) [ 454.240382][T29013] hfsplus: unable to parse mount options [ 454.268794][T29125] EXT4-fs (loop1): #blocks per group too big: 16385 22:14:47 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f00000075000000000000009500000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0}, 0x28) 22:14:47 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x500000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) [ 454.374143][T29125] EXT4-fs (loop1): #blocks per group too big: 16385 22:14:47 executing program 1: socketpair(0x0, 0xb4c4ed5e3b212225, 0x2, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x3, 0x101000) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000400)=0x2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xa22c, 0x4, [0x2, 0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000014c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @remote, 0x8}}, 0x0, 0x2}, &(0x7f0000000340)=0x90) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f00000001c0)={'vcan0\x00', 0x4}) request_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='lo\x00', 0xfffffffffffffffa) keyctl$link(0x8, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000440)=0x11) r3 = openat$autofs(0xffffffffffffff9c, 0x0, 0x4000, 0x0) setsockopt$packet_int(r3, 0x107, 0x1e, &(0x7f0000000240), 0x4) ioctl$KDGKBENT(r2, 0x8924, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x80d, 0x3, 0x1, "38a508f3685426240eaf3bffc3e7a28d", "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"}, 0x80d, 0x3) 22:14:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:47 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:47 executing program 2: syz_open_dev$sndctrl(0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000000008000}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0xfffffffffffffffa, 0x5, [0x80000000, 0x5, 0x1, 0x80, 0x0]}, &(0x7f0000000200)=0x12) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000540)={r2, 0x10, &(0x7f0000000500)=[@in={0x2, 0x4e23, @empty}]}, &(0x7f0000000600)=0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f00000005c0)=ANY=[@ANYBLOB="0100000000000000ffff000020000000000000000000002ba00000000100000000000200"/55]) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r3 = openat$vfio(0xffffffffffffff9c, 0x0, 0x408000, 0x0) r4 = fcntl$getown(r1, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000140)=r4) prctl$PR_SET_DUMPABLE(0x4, 0x0) sendto$inet(r1, 0x0, 0x223, 0x200007fa, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r5 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000480)={0x5, 0xfffffffffffffffe, 0xf, 0x0, 0x5, 0x6}, &(0x7f00000004c0)=0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x4e22, @remote}], 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$KVM_GET_PIT2(r5, 0x8070ae9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x9, 0x0, 0x53, 0x0, 0x0, 0x6, 0x0, 0xe, 0x7fff, 0x100, 0x3, 0x7, 0x4, 0xd89, 0x3, 0x7f, 0x2, 0x1, 0x6, 0x1ff, 0xf1, 0x0, 0x9, 0x1f, 0x2, 0x1d, 0x8, 0x20, 0x8, 0xe28, 0x40f7, 0x6, 0x6, 0xfffffffffffffe00, 0x10001, 0x3, 0x0, 0x2, 0x7, @perf_bp={&(0x7f0000000240)}, 0x40, 0x9076, 0x5, 0xf, 0xffffffff, 0x0, 0x1}, r4, 0x6, r5, 0x1) sendmmsg(r5, 0x0, 0x0, 0x11) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 454.514692][T29341] hfsplus: type requires a 4 character value [ 454.535983][T29341] hfsplus: unable to parse mount options 22:14:48 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x600000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:48 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="0f0fdf4d12950920ca7316a82ce9c0485445055749b0b78eae27e2be7e48cd27b1c41901e93b355073e39056bd914e23e9a3212ef027d9cc31e571d7d27a282cfb12e7fde5ff77935c1f5929cb56b58e47511142c0687806b106f4c0041c6738b6d11771c1ffaae56a7509c086fd670b57667eb576ba718d409864b83d47e7f22990fe10a13dc980cf3119394db2d1e9e90e47ef00097712f2d98b859d7eb21b95f9a384cadaaf9d2fb84f0debdad64b2e85bff89fa1d92a5ed515801bb1177af81584bc1ef9fa4bb56d2c00118d12d6678a16a80c26f18f5eb690d8da6bcd6c483e666e3b23f54c383a493fd3bb46dae9c0a45bcb", 0xf5}, {&(0x7f00000000c0)="abe24838cfb5f32aefbe657ff45f440999f30641fd8bd1f297efb47756cc776dd2c6db59e8c46120552c378eba46103be2540958d7220b2556ea3a8db546eb82e2e0", 0x42}, {&(0x7f0000000500)="51317d6a46850926866656ff78ee26f30b12c59d873fb4b29630b0c1073314ac56ce6c9aadb6edc89fdc9227c185f33df9d3be37e8d8d35ebe1eacc052a0d16e792dce88bad00d3b84a7172eef787554e211ce4ca545f76b6cac413f7b85fca663c6a03630db30f11fbb218f2e6b6d050d5b067abc7210f2a7f60a19b29e688352dcefd6aa77669f5f7e1ba3aa4f03536e04ede3beaa32ca8b5a05ff8524e0fb5502b563d572ddd1", 0xa8}, {&(0x7f0000000200)}, {&(0x7f00000005c0)="9a974c49fc3e849ea124da379dfafbdcbb39dc0e97692ecdbf1b70a022789aad821e457bc5b3a85cf8b143c1ff5f1b06594be72352321fb43dedee5aa7238c8c5657b257cc89124e473e4eef", 0x4c}, {&(0x7f0000000640)="b14517f7f750e4450e1f1da8d1486f7770fab6dd33d44283acf82813f2e40383e800f4800121d57dd45149bbb7fb23d8af60fe6d9f22b1a004ff9e802e8bb9097f043b0a218583", 0x47}, {&(0x7f00000006c0)="0f940e919050a85d63bc9c1671aae8c0341551d8fca0c64aef7c0e0ce034a22af7e2ff086099a550535cf10df247729c996a256c2884ef6f8a6c4612d7922e340f9d8c617f23732566eb5d33555560ee2010ecbfb408628d4b3b612e7ee1ce4c70940c293618be7193cc3febc4abc473e6480191c0e4eeea194967dff5e208697bd37866554a09c89510273d1d28266c61f59bfef78d1bc83336bf73db37647bf1ac8e776c8c1c17e75dbe8add49c8c164de7eb85eb36567c2241e9f0af0818a6a33", 0xc2}], 0x7, &(0x7f0000000840)=[{0xf0, 0x10e, 0x100000000, "da28eb7d2bb8af40b0aa072293a802a0576d1d8bd70ac5e68cc572981089f42b1dc1298ac1ff3297255f8ef54fe92fbf46aebb11dfc26157264630776fbdde9f09fb16f172913251af943a065df7b40f479b6c5051ebc6b9560242ac931fe854c12792c11094ae52a721c88cbaa8353b3c75fc4c2dae772d695e2a7dfbb0668cf22d494cb320f5e19e93b9e5ed26629b72c8281bae2c7db76f5c09add3c3d839b91dd54ca5bc1564d4596d751c9fdbb693a26a91c02c52f3f77550e29c68f2fb1172dd9119f4b28c1a71fffee7958ec6ccdf113ea847916f36"}, {0x60, 0x103, 0x3, "b18dfc906d186dea13215f4f2699b003c6d721ab4efcb30c215d23a991a565a1d09624305ec0600ff53b10de48bc4a7b4a6317d83bce852b70bbcbf0a0b4e3196c7da7dd6410ceaf18a5b7"}, {0x60, 0x1, 0x3, "56894a7c2b17079e306d0e36c715599008794e1e9714bc7eddfb48da448668e38be92ee2697c8a09f0dc223a7f6fd43aecbb3a572317296871320f7923b699bff4acbf4644792cbfa8d3bb6a01b5"}], 0x1b0}}, {{&(0x7f0000000b80)=@can, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c00)="ca9c01999dd35db58c1a187877a555544783afd7b99ec5470bd4dcab9765a283ffd2dbc31475e8a6bb0200e4acd6d7cd24c30de1b29486bc0f9567461beb163f2c130d79dd0826e02df9f3d0884d1264374ba9b1e57942f133a16e05459e4cf32f6c92617290d90ac3f54b6e8c39f5ee7f862bc1", 0x74}, {&(0x7f0000000c80)='\x00', 0x1}], 0x2}}], 0x2, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:48 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002b40)={'bond0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) dup3(r1, r0, 0x0) 22:14:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 454.840180][T29660] hfsplus: type requires a 4 character value [ 454.869340][T29660] hfsplus: unable to parse mount options 22:14:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:48 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:48 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x700000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:48 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x11, 0x5) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185502, &(0x7f0000000180)) 22:14:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) [ 455.165108][T30068] hfsplus: type requires a 4 character value [ 455.190095][T30068] hfsplus: unable to parse mount options 22:14:48 executing program 2: syz_open_dev$sndctrl(0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000000008000}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0xfffffffffffffffa, 0x5, [0x80000000, 0x5, 0x1, 0x80, 0x0]}, &(0x7f0000000200)=0x12) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000540)={r2, 0x10, &(0x7f0000000500)=[@in={0x2, 0x4e23, @empty}]}, &(0x7f0000000600)=0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f00000005c0)=ANY=[@ANYBLOB="0100000000000000ffff000020000000000000000000002ba00000000100000000000200"/55]) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r3 = openat$vfio(0xffffffffffffff9c, 0x0, 0x408000, 0x0) r4 = fcntl$getown(r1, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000140)=r4) prctl$PR_SET_DUMPABLE(0x4, 0x0) sendto$inet(r1, 0x0, 0x223, 0x200007fa, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r5 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000480)={0x5, 0xfffffffffffffffe, 0xf, 0x0, 0x5, 0x6}, &(0x7f00000004c0)=0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x4e22, @remote}], 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$KVM_GET_PIT2(r5, 0x8070ae9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x9, 0x0, 0x53, 0x0, 0x0, 0x6, 0x0, 0xe, 0x7fff, 0x100, 0x3, 0x7, 0x4, 0xd89, 0x3, 0x7f, 0x2, 0x1, 0x6, 0x1ff, 0xf1, 0x0, 0x9, 0x1f, 0x2, 0x1d, 0x8, 0x20, 0x8, 0xe28, 0x40f7, 0x6, 0x6, 0xfffffffffffffe00, 0x10001, 0x3, 0x0, 0x2, 0x7, @perf_bp={&(0x7f0000000240)}, 0x40, 0x9076, 0x5, 0xf, 0xffffffff, 0x0, 0x1}, r4, 0x6, r5, 0x1) sendmmsg(r5, 0x0, 0x0, 0x11) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 22:14:48 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) gettid() mount(0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') 22:14:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:48 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x800000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 455.602370][T30291] hfsplus: type requires a 4 character value [ 455.611092][T30291] hfsplus: unable to parse mount options 22:14:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:49 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:49 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000004580)=[{&(0x7f0000000ec0)=""/92, 0x5c}, {&(0x7f0000000100)=""/168, 0xa8}], 0x2}}], 0x1, 0x0, 0x0) 22:14:49 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x3f00000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) [ 455.874277][T30672] hfsplus: type requires a 4 character value [ 455.891429][T30672] hfsplus: unable to parse mount options 22:14:49 executing program 2: syz_open_dev$sndctrl(0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer2\x00', 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000000008000}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0xfffffffffffffffa, 0x5, [0x80000000, 0x5, 0x1, 0x80, 0x0]}, &(0x7f0000000200)=0x12) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000540)={r2, 0x10, &(0x7f0000000500)=[@in={0x2, 0x4e23, @empty}]}, &(0x7f0000000600)=0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f00000005c0)=ANY=[@ANYBLOB]) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r3 = openat$vfio(0xffffffffffffff9c, 0x0, 0x408000, 0x0) r4 = fcntl$getown(r1, 0x9) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000140)=r4) prctl$PR_SET_DUMPABLE(0x4, 0x0) sendto$inet(r1, 0x0, 0x223, 0x200007fa, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r5 = syz_open_dev$cec(&(0x7f0000000440)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000480)={0x5, 0xfffffffffffffffe, 0xf, 0x0, 0x5, 0x6}, &(0x7f00000004c0)=0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x4e22, @remote}], 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$KVM_GET_PIT2(r5, 0x8070ae9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x9, 0x0, 0x53, 0xdb, 0x0, 0x6, 0x0, 0xe, 0x7fff, 0x100, 0x3, 0x7, 0x4, 0xd89, 0x3, 0x7f, 0x2, 0x1, 0x6, 0x1ff, 0xf1, 0xfffffffffffffff8, 0x9, 0x1f, 0x2, 0x1d, 0x8, 0x20, 0x8, 0xe28, 0x40f7, 0x6, 0x6, 0xfffffffffffffe00, 0x10001, 0x3, 0x0, 0x2, 0x7, @perf_bp={&(0x7f0000000240)}, 0x40, 0x9076, 0x5, 0xf, 0xffffffff, 0x7fff, 0x1}, r4, 0x6, r5, 0x1) sendmmsg(r5, 0x0, 0x0, 0x11) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 22:14:49 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:49 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:49 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x4000000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) [ 456.544990][T31017] hfsplus: type requires a 4 character value [ 456.571100][T31017] hfsplus: unable to parse mount options 22:14:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:50 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:50 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:50 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0xf6ffffff00000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:50 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) [ 456.897169][T31397] hfsplus: type requires a 4 character value [ 456.915454][T31397] hfsplus: unable to parse mount options 22:14:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:50 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:50 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:50 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0xff00000000000000, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:50 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 457.262939][T31658] hfsplus: type requires a 4 character value [ 457.297285][T31658] hfsplus: unable to parse mount options 22:14:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:50 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:50 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:50 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:50 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x2) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:50 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:51 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:51 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) [ 457.633808][T31880] hfsplus: type requires a 4 character value [ 457.671123][T31880] hfsplus: unable to parse mount options 22:14:51 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:51 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x3) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:51 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:51 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:51 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:51 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) [ 457.981969][T32198] hfsplus: type requires a 4 character value [ 458.015790][T32198] hfsplus: unable to parse mount options 22:14:51 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:51 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:51 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:51 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x4) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:51 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:51 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:51 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 458.352834][T32528] hfsplus: type requires a 4 character value [ 458.393281][T32528] hfsplus: unable to parse mount options 22:14:51 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:51 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) 22:14:52 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x5) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:52 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:52 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) 22:14:52 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) [ 458.706192][T32749] hfsplus: type requires a 4 character value [ 458.738275][T32749] hfsplus: unable to parse mount options 22:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) 22:14:52 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:52 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x6) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:52 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:52 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 459.083222][ T604] hfsplus: type requires a 4 character value [ 459.114598][ T604] hfsplus: unable to parse mount options 22:14:52 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:52 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x7) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:52 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:52 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:52 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) [ 459.406806][ T830] hfsplus: type requires a 4 character value [ 459.439431][ T830] hfsplus: unable to parse mount options 22:14:52 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:53 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x8) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:53 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:53 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 459.743548][ T1049] hfsplus: type requires a 4 character value 22:14:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="030000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:53 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 459.789016][ T1049] hfsplus: unable to parse mount options 22:14:53 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0b") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:53 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x300) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="040000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:53 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0b") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="050000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 460.124002][ T1390] hfsplus: type requires a 4 character value [ 460.144312][ T1390] hfsplus: unable to parse mount options 22:14:53 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0b") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:53 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x500) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47b") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="060000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:53 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47b") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 460.515416][ T1729] hfsplus: type requires a 4 character value 22:14:53 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, 0x0, r0, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="070000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 460.559861][ T1729] hfsplus: unable to parse mount options 22:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47b") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:54 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x600) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:54 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:54 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="080000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 460.878287][ T2072] hfsplus: type requires a 4 character value 22:14:54 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 460.935385][ T2072] hfsplus: unable to parse mount options 22:14:54 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x700) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:54 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="090000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:54 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x2) 22:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:54 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, 0x0, 0x2) 22:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 461.216498][ T2294] hfsplus: type requires a 4 character value [ 461.246741][ T2294] hfsplus: unable to parse mount options 22:14:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0a0000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:54 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x3f00) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:54 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:54 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, 0x0, 0x2) 22:14:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:14:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0b0000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:14:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) 22:14:55 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, 0x0, 0x2) [ 461.576228][ T2628] hfsplus: type requires a 4 character value [ 461.607273][ T2628] hfsplus: unable to parse mount options 22:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:55 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:55 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) 22:14:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0c0000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:55 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x0) 22:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) 22:14:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0d0000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:55 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x0) 22:14:55 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0xff00) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:55 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:55 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@empty, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000280)='./file0\x00', 0x0) 22:14:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0e0000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) [ 462.214307][ T3202] hfsplus: type requires a 4 character value [ 462.232997][ T3202] hfsplus: unable to parse mount options 22:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:55 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:55 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1000000) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0f0000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'syz_tun\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:14:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/g\\oup.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\x8b\xe8\xaba\x98P\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXY>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W_\xb6\xe4\x8d\xba\xee\b\xeb\x8e\xd8[T|i$\x88\x04\t\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0', 0x2761, 0x0) 22:14:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="100000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:56 executing program 5: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$audion(0x0, 0x0, 0x200000) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@can, 0x0) 22:14:56 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:56 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x2000000) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="110000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 22:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:56 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:56 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x3000000) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="120000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) [ 463.140736][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) [ 463.255310][ T4036] hfsplus: type requires a 4 character value [ 463.261775][ T4036] hfsplus: unable to parse mount options 22:14:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 22:14:56 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x4000000) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) 22:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="130000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000200b80000000000000000000000000014000200fe00f7000d00000000000000000000aaa2d6bdd620c55ab91086f2c014e1fac67b544cd0c0ee45f234cbc552cd3259fc54023ef2c964cec047a8fd383a1114ded9ae7a82f5b14c97d911104221ed386f88d9c525e8c08d6de7dde5ec94c5a4541d1d6003bcd03587a0b697ac4e3fbc1fe2a9a5f70f28fbfd9b3316b80b6e7b872884e9eb784f383c58704f1c70437a0066fc48e3d14fbd71e8610174abf30362ec3f6d7043bd01623235a810c60fd2a9035f79f5dd04fe1036c110ea227674abe53dd04ae4f114243483cac9b4ebef5dec88961bda6dfad485135392b942e022b9d7b67ca0a3be2a497ccdc9e43bd7dcc1da5b47a9dee5492e78904468eaabee0a3e93eab0b177f7c15b9133275804"], 0x40}}, 0x0) 22:14:56 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xf9', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) [ 463.558635][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:14:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40010000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 22:14:57 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x5000000) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:57 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x7f', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="150000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:57 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) [ 463.898577][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:14:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x2f, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 22:14:57 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x8c', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@type={'type', 0x3d, "2a2c20bb"}}]}) 22:14:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="160000001400090500000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"], 0x40}}, 0x0) 22:14:57 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) 22:14:57 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x26c02) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x6000000) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, 0x0) 22:14:57 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000040)) shmget(0x3, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000002c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x0, r2, 0x0, 0x0, 0x0, 0x20, 0x1}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9}) flock(r1, 0x1) lseek(r1, 0x0, 0x0) [ 569.720824][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 569.727871][ C0] (detected by 0, t=10502 jiffies, g=74861, q=281) [ 569.734460][ C0] rcu: All QSes seen, last rcu_preempt kthread activity 10503 (4294994058-4294983555), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 569.747809][ C0] syz-executor.5 R running task 28344 4537 10295 0x00000008 [ 569.755715][ C0] Call Trace: [ 569.759054][ C0] [ 569.762023][ C0] sched_show_task.cold+0x2ed/0x34e [ 569.767259][ C0] rcu_sched_clock_irq.cold+0xac8/0xc13 [ 569.772818][ C0] update_process_times+0x32/0x80 [ 569.777852][ C0] tick_sched_handle+0xa2/0x190 [ 569.782703][ C0] tick_sched_timer+0x53/0x140 [ 569.787494][ C0] __hrtimer_run_queues+0x364/0xe40 [ 569.793404][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 569.799485][ C0] ? hrtimer_sleeper_start_expires+0x90/0x90 [ 569.805471][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 569.811196][ C0] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 569.817827][ C0] hrtimer_interrupt+0x314/0x770 [ 569.822781][ C0] smp_apic_timer_interrupt+0x160/0x610 [ 569.828325][ C0] apic_timer_interrupt+0xf/0x20 [ 569.833265][ C0] RIP: 0010:__kasan_check_read+0x0/0x20 [ 569.838828][ C0] Code: e8 09 bd ae ff 0f 0b 4c 8b 4d d0 e9 27 ee ff ff 48 8b 73 58 89 c2 48 c7 c7 a0 ce 89 88 f7 da e8 ea bc ae ff e9 da ee ff ff 90 <55> 89 f6 31 d2 48 89 e5 48 8b 4d 08 e8 cf 26 00 00 5d c3 0f 1f 00 [ 569.858442][ C0] RSP: 0018:ffff8880ae809208 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 [ 569.866942][ C0] RAX: 0000000000000000 RBX: ffff88809c948f48 RCX: ffffffff8158f467 [ 569.874920][ C0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88809c948f48 [ 569.882890][ C0] RBP: ffff8880ae8092d0 R08: 1ffff110139291e9 R09: ffffed10139291ea [ 569.890856][ C0] R10: ffffed10139291e9 R11: ffff88809c948f4b R12: 0000000000000001 [ 569.898842][ C0] R13: 0000000000000003 R14: ffffed10139291e9 R15: 0000000000000001 [ 569.906829][ C0] ? apic_timer_interrupt+0xa/0x20 [ 569.911945][ C0] ? native_queued_spin_lock_slowpath+0xb7/0x9f0 [ 569.918276][ C0] ? native_queued_spin_lock_slowpath+0xb7/0x9f0 [ 569.924610][ C0] ? __pv_queued_spin_lock_slowpath+0xd10/0xd10 [ 569.930852][ C0] ? mark_held_locks+0xf0/0xf0 [ 569.935617][ C0] do_raw_spin_lock+0x20e/0x2e0 [ 569.940463][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 569.945396][ C0] ? lock_acquire+0x190/0x410 [ 569.950080][ C0] ? release_sock+0x20/0x1c0 [ 569.954690][ C0] ? __kasan_check_read+0x11/0x20 [ 569.959717][ C0] _raw_spin_lock_bh+0x3b/0x50 [ 569.964479][ C0] ? release_sock+0x20/0x1c0 [ 569.969076][ C0] release_sock+0x20/0x1c0 [ 569.973520][ C0] wait_on_pending_writer+0x20f/0x420 [ 569.978894][ C0] ? tls_init+0x560/0x560 [ 569.983223][ C0] ? __kasan_check_read+0x11/0x20 [ 569.988247][ C0] ? prepare_to_wait_exclusive+0x320/0x320 [ 569.994054][ C0] ? lock_downgrade+0x920/0x920 [ 569.999329][ C0] tls_sk_proto_cleanup+0x2c5/0x3e0 [ 570.004569][ C0] ? wait_on_pending_writer+0x420/0x420 [ 570.010214][ C0] ? trace_hardirqs_on+0x67/0x240 [ 570.015246][ C0] ? drain_stock.isra.0+0x1cb/0x240 [ 570.020461][ C0] tls_sk_proto_unhash+0x90/0x3f0 [ 570.025507][ C0] tcp_set_state+0x5b9/0x7d0 [ 570.030116][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 570.036455][ C0] ? __sk_mem_reduce_allocated+0x1b0/0x560 [ 570.042263][ C0] ? tcp_alloc_md5sig_pool+0x4a0/0x4a0 [ 570.047720][ C0] ? __sk_mem_reclaim+0x55/0x70 [ 570.052573][ C0] ? tcp_write_queue_purge+0x5d8/0x1310 [ 570.058118][ C0] ? lock_downgrade+0x920/0x920 [ 570.062964][ C0] tcp_done+0xe2/0x320 [ 570.067029][ C0] tcp_reset+0x132/0x500 [ 570.071278][ C0] tcp_validate_incoming+0xa2d/0x1660 [ 570.076665][ C0] tcp_rcv_established+0x6b5/0x1e70 [ 570.081877][ C0] ? tcp_data_queue+0x4860/0x4860 [ 570.086979][ C0] tcp_v6_do_rcv+0x41e/0x12c0 [ 570.091656][ C0] tcp_v6_rcv+0x31f1/0x3500 [ 570.096180][ C0] ? tcp_v6_syn_recv_sock+0x2290/0x2290 [ 570.101754][ C0] ? nf_confirm+0x360/0x4d0 [ 570.106265][ C0] ? mark_held_locks+0xf0/0xf0 [ 570.111032][ C0] ip6_protocol_deliver_rcu+0x2fe/0x1660 [ 570.116679][ C0] ip6_input_finish+0x84/0x170 [ 570.121443][ C0] ip6_input+0xe4/0x3f0 [ 570.125609][ C0] ? ip6_input_finish+0x170/0x170 [ 570.130642][ C0] ? __kasan_check_read+0x11/0x20 [ 570.135702][ C0] ? ip6_protocol_deliver_rcu+0x1660/0x1660 [ 570.141590][ C0] ? lock_downgrade+0x920/0x920 [ 570.146531][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 570.152860][ C0] ip6_rcv_finish+0x1de/0x2f0 [ 570.157719][ C0] ipv6_rcv+0x10e/0x420 [ 570.161896][ C0] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 570.167355][ C0] ? try_to_wake_up+0xfd/0x1a90 [ 570.172211][ C0] ? ip6_rcv_finish_core.isra.0+0x560/0x560 [ 570.178099][ C0] ? complete+0x61/0x80 [ 570.182263][ C0] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 570.187725][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 570.193616][ C0] ? __netif_receive_skb_core+0x3060/0x3060 [ 570.199522][ C0] ? lock_acquire+0x190/0x410 [ 570.204215][ C0] ? process_backlog+0x195/0x750 [ 570.209157][ C0] __netif_receive_skb+0x2c/0x1d0 [ 570.214181][ C0] process_backlog+0x206/0x750 [ 570.219047][ C0] ? __kasan_check_read+0x11/0x20 [ 570.224086][ C0] net_rx_action+0x508/0x10c0 [ 570.228766][ C0] ? napi_complete_done+0x4b0/0x4b0 [ 570.233965][ C0] ? sched_clock+0x2e/0x50 [ 570.238387][ C0] ? inet_csk_listen_stop+0x1bc/0x850 [ 570.243849][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 570.250095][ C0] __do_softirq+0x262/0x98c [ 570.254606][ C0] ? inet_csk_listen_stop+0x1bc/0x850 [ 570.259974][ C0] do_softirq_own_stack+0x2a/0x40 [ 570.265001][ C0] [ 570.267940][ C0] do_softirq.part.0+0x11a/0x170 [ 570.272875][ C0] __local_bh_enable_ip+0x211/0x270 [ 570.278118][ C0] inet_csk_listen_stop+0x1e0/0x850 [ 570.283326][ C0] tcp_close+0xd5b/0x10e0 [ 570.287657][ C0] ? ip_mc_drop_socket+0x211/0x270 [ 570.292763][ C0] ? down_write+0xdf/0x150 [ 570.297193][ C0] inet_release+0xed/0x200 [ 570.301634][ C0] inet6_release+0x53/0x80 [ 570.306107][ C0] __sock_release+0xce/0x280 [ 570.310703][ C0] sock_close+0x1e/0x30 [ 570.314858][ C0] __fput+0x2ff/0x890 [ 570.318842][ C0] ? __sock_release+0x280/0x280 [ 570.323725][ C0] ____fput+0x16/0x20 [ 570.327728][ C0] task_work_run+0x145/0x1c0 [ 570.332332][ C0] exit_to_usermode_loop+0x316/0x380 [ 570.337619][ C0] do_syscall_64+0x65f/0x760 [ 570.342214][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.348126][ C0] RIP: 0033:0x413511 [ 570.352028][ C0] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 570.373166][ C0] RSP: 002b:00007fff4fcea600 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 570.381580][ C0] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 0000000000413511 [ 570.389550][ C0] RDX: 0000000000000000 RSI: ffffffff873d4860 RDI: 0000000000000005 [ 570.397632][ C0] RBP: 0000000000000001 R08: ffffffff8128fdec R09: 0000000054a70870 [ 570.405703][ C0] R10: 00007fff4fcea6e0 R11: 0000000000000293 R12: 000000000075c9a0 [ 570.413679][ C0] R13: 000000000075c9a0 R14: 0000000000761158 R15: ffffffffffffffff [ 570.421675][ C0] ? irq_fpu_usable+0xc/0xc0 [ 570.426275][ C0] ? csum_ipv6_magic+0x20/0x80 [ 570.431050][ C0] rcu: rcu_preempt kthread starved for 10573 jiffies! g74861 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 570.442241][ C0] rcu: RCU grace-period kthread stack dump: [ 570.448130][ C0] rcu_preempt R running task 29392 10 2 0x80004000 [ 570.456033][ C0] Call Trace: [ 570.459340][ C0] __schedule+0x755/0x15b0 [ 570.463764][ C0] ? __sched_text_start+0x8/0x8 [ 570.468624][ C0] schedule+0xa8/0x270 [ 570.473026][ C0] schedule_timeout+0x486/0xc50 [ 570.477885][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 570.482823][ C0] ? usleep_range+0x170/0x170 [ 570.487516][ C0] ? trace_hardirqs_on+0x67/0x240 [ 570.492542][ C0] ? __kasan_check_read+0x11/0x20 [ 570.497576][ C0] ? __next_timer_interrupt+0x1a0/0x1a0 [ 570.503143][ C0] ? swake_up_one+0x60/0x60 [ 570.507664][ C0] ? trace_hardirqs_on+0x67/0x240 [ 570.512697][ C0] rcu_gp_kthread+0x9b2/0x18c0 [ 570.517470][ C0] ? rcu_barrier+0x310/0x310 [ 570.522152][ C0] ? trace_hardirqs_on+0x67/0x240 [ 570.527179][ C0] ? __kasan_check_read+0x11/0x20 [ 570.532215][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 570.538455][ C0] ? __kthread_parkme+0x108/0x1c0 [ 570.543480][ C0] ? __kasan_check_read+0x11/0x20 [ 570.548508][ C0] kthread+0x361/0x430 [ 570.552579][ C0] ? rcu_barrier+0x310/0x310 [ 570.557173][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 570.563507][ C0] ret_from_fork+0x24/0x30