\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) chown(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) [ 153.241876] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:50:58 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) open(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4000, 0x111) 05:50:58 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) [ 153.362450] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:50:58 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) r11 = dup(r10) setsockopt$inet6_tcp_int(r11, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r12 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r11, r12, 0x0, 0x8000fffffffe) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2, r11}) r13 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x2000002) 05:50:58 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) chown(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) 05:50:58 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:50:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_mixed='shortname=mixed'}, {@shortname_win95='shortname=win95'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:50:58 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4000, 0x111) 05:50:58 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) [ 153.558343] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 05:50:59 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4000, 0x111) [ 153.615280] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:50:59 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) r11 = dup(r10) setsockopt$inet6_tcp_int(r11, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r12 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r11, r12, 0x0, 0x8000fffffffe) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2, r11}) r13 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x2000002) 05:50:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_mixed='shortname=mixed'}, {@shortname_win95='shortname=win95'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:50:59 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) chown(0x0, 0x0, 0x0) 05:50:59 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:50:59 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4000, 0x111) 05:50:59 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) [ 153.809265] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:50:59 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) open(0x0, 0x4000, 0x111) [ 153.909054] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 05:50:59 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:50:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_mixed='shortname=mixed'}, {@shortname_win95='shortname=win95'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:50:59 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:50:59 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) open(0x0, 0x4000, 0x111) 05:50:59 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) chown(0x0, 0x0, 0x0) [ 154.019404] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:50:59 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) r11 = dup(r10) setsockopt$inet6_tcp_int(r11, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r12 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r11, r12, 0x0, 0x8000fffffffe) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2, r11}) r13 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x2000002) 05:50:59 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) chown(0x0, 0x0, 0x0) 05:50:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_mixed='shortname=mixed'}, {@shortname_win95='shortname=win95'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:50:59 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) open(0x0, 0x4000, 0x111) 05:50:59 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:50:59 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 154.222336] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value [ 154.244462] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 05:50:59 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:50:59 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) r11 = dup(r10) setsockopt$inet6_tcp_int(r11, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r12 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r11, r12, 0x0, 0x8000fffffffe) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2, r11}) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 05:50:59 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:50:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_mixed='shortname=mixed'}, {@shortname_win95='shortname=win95'}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:50:59 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) open(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x111) 05:50:59 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) [ 154.438701] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 154.467432] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:50:59 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:50:59 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) open(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x111) 05:50:59 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:50:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "8846b0aa13bcc5f84645b341a4a21053"}, 0x11, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)={0x0, 0x8000}) 05:50:59 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) r11 = dup(r10) setsockopt$inet6_tcp_int(r11, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r12 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r11, r12, 0x0, 0x8000fffffffe) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2, r11}) 05:50:59 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_mixed='shortname=mixed'}, {@shortname_win95='shortname=win95'}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:51:00 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) open(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x111) 05:51:00 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:00 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 154.689860] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 05:51:00 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) open(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x111) 05:51:00 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) r11 = dup(r10) setsockopt$inet6_tcp_int(r11, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2, r11}) [ 154.783787] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:00 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={r1, 0x40, 0x2}) 05:51:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:00 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) open(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4000, 0x0) 05:51:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_mixed='shortname=mixed'}, {@shortname_win95='shortname=win95'}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:51:00 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 154.895440] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 05:51:00 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={r1, 0x40, 0x2}) 05:51:00 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) r11 = dup(r10) setsockopt$inet6_tcp_int(r11, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2, r11}) 05:51:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) [ 155.010950] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0xfffffffffffffec9, 0xfa00, {&(0x7f0000000140), r7, 0x8}}, 0xd) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000080)) 05:51:00 executing program 2: openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:00 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={r1, 0x40, 0x2}) 05:51:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@shortname_mixed='shortname=mixed'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) [ 155.143502] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 05:51:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:00 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r10 = socket$inet6(0xa, 0x400000000001, 0x0) r11 = dup(r10) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2, r11}) 05:51:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:00 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) 05:51:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0xfffffffffffffec9, 0xfa00, {&(0x7f0000000140), r7, 0x8}}, 0xd) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000080)) 05:51:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) [ 155.355987] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:00 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) [ 155.427378] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 05:51:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:51:00 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:00 executing program 5: ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0xfffffffffffffec9, 0xfa00, {&(0x7f0000000140), r7, 0x8}}, 0xd) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000080)) [ 155.577684] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:01 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) 05:51:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:51:01 executing program 5: ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:01 executing program 5: ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:01 executing program 1: openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) [ 155.736786] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 05:51:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0xfffffffffffffec9, 0xfa00, {&(0x7f0000000140), r7, 0x8}}, 0xd) 05:51:01 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) [ 155.803818] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) 05:51:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:51:01 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) [ 155.963153] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 05:51:01 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:01 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) [ 156.078068] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 05:51:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:51:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) 05:51:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:01 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:01 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/4096) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 05:51:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) [ 156.277867] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:51:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:01 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={r1, 0x40, 0x2}) 05:51:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000000)={0x1, 0xeb4, [0x3, 0xcb1b, 0x2, 0x4, 0x4], 0x5}) 05:51:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 156.497142] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:01 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="30000000100001080000000000000000000000009468f538ae1ed9f0c0cb7e14030ba5d319ed8c92a86616228a7378648f26e532188d2b6915a609b924b0edc211740fcd0c6e402e85a04654c3a800829875b778613506d7a4838c65bd467761d0b327198258b109829f630dd3bc01e33fef36f5685ce7da524f890f825b941a5f300d9266aada64f1eb628fe3d0efe455e89158c649589c359fac980e2d5624c4576ec9d31da0a18a106ff78a02d9ad19", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008007c33d362"], 0x3}}, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:01 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={r1, 0x40, 0x2}) 05:51:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:51:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) 05:51:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) 05:51:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:02 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={r1, 0x40, 0x2}) 05:51:02 executing program 5: openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:02 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@getaddr={0x0, 0x16, 0x4, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) [ 156.762265] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@rodir='rodir'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:51:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) 05:51:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) 05:51:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0xfffffffffffffec9, 0xfa00, {&(0x7f0000000140), r7, 0x8}}, 0xd) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000080)) 05:51:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:02 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) [ 156.991466] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) 05:51:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:51:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) 05:51:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0xfffffffffffffec9, 0xfa00, {&(0x7f0000000140), r7, 0x8}}, 0xd) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000080)) 05:51:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) 05:51:02 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r7, &(0x7f0000000100)={0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x40, 0x2}) [ 157.302994] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) 05:51:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0xfffffffffffffec9, 0xfa00, {&(0x7f0000000140), r7, 0x8}}, 0xd) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000080)) 05:51:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}, {@dont_hash='dont_hash'}]}) 05:51:02 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r6, &(0x7f0000000100)={0x3f}, 0x8) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={r1, 0x40, 0x2}) 05:51:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) close(0xffffffffffffffff) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) [ 157.515547] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}, {@euid_eq={'euid'}}]}) 05:51:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0xfffffffffffffec9, 0xfa00, {&(0x7f0000000140), r7, 0x8}}, 0xd) 05:51:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) close(0xffffffffffffffff) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) 05:51:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={r1, 0x40, 0x2}) 05:51:03 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r6, &(0x7f0000000100)={0x3f}, 0x8) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) [ 157.734275] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x2}}, 0x10) 05:51:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1000}}]}) 05:51:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={r1, 0x40, 0x2}) 05:51:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) close(0xffffffffffffffff) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) 05:51:03 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) signalfd(r6, &(0x7f0000000100)={0x3f}, 0x8) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) [ 157.964203] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) 05:51:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") dup3(r2, r3, 0xcd544a90083bccda) r4 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) 05:51:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}]}) 05:51:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 05:51:03 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x5540f93d48f48dde, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 05:51:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) 05:51:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 158.207758] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 05:51:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@dont_hash='dont_hash'}]}) 05:51:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r5) 05:51:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:03 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 05:51:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r5, 0x2}}, 0x10) [ 158.428772] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 05:51:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) close(0xffffffffffffffff) 05:51:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:03 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r5, 0x2}}, 0x10) 05:51:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) close(0xffffffffffffffff) [ 158.662022] FAT-fs (loop3): bogus number of reserved sectors [ 158.691638] FAT-fs (loop3): Can't find a valid FAT filesystem 05:51:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:04 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = dup3(r2, r3, 0xcd544a90083bccda) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) close(0xffffffffffffffff) 05:51:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) 05:51:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") dup3(r2, r3, 0xcd544a90083bccda) r4 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r4) 05:51:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:04 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) [ 158.979112] FAT-fs (loop3): bogus number of reserved sectors [ 159.015011] FAT-fs (loop3): Can't find a valid FAT filesystem 05:51:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r4) 05:51:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2}) 05:51:04 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) 05:51:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r3) 05:51:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2}) [ 159.324626] FAT-fs (loop3): bogus number of reserved sectors 05:51:04 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) 05:51:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) [ 159.375427] FAT-fs (loop3): Can't find a valid FAT filesystem 05:51:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r3) 05:51:04 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>', r3}}]}) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x4c44986c1325bae7, 0x6) 05:51:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) 05:51:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) 05:51:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 159.642752] hfs: umask requires a value [ 159.653179] hfs: unable to parse mount options 05:51:05 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) [ 159.691103] FAT-fs (loop3): bogus number of reserved sectors 05:51:05 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>', r3}}]}) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x4c44986c1325bae7, 0x6) 05:51:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) [ 159.732794] FAT-fs (loop3): Can't find a valid FAT filesystem 05:51:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) 05:51:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:05 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:05 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r5, 0x2}}, 0x10) [ 159.916905] hfs: umask requires a value [ 159.925272] hfs: unable to parse mount options 05:51:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) 05:51:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:05 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>', r3}}]}) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x4c44986c1325bae7, 0x6) 05:51:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r5, 0x2}}, 0x10) 05:51:05 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:05 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) 05:51:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 05:51:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) 05:51:05 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 160.273716] hfs: umask requires a value [ 160.288952] hfs: unable to parse mount options 05:51:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) 05:51:05 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 05:51:05 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>', r3}}]}) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:05 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) 05:51:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) 05:51:05 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:05 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) [ 160.612753] hfs: umask requires a value [ 160.628697] hfs: unable to parse mount options 05:51:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r3) 05:51:06 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>', r3}}]}) 05:51:06 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r3 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r3) 05:51:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x2}) 05:51:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 160.899977] hfs: umask requires a value 05:51:06 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:06 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) [ 160.921944] hfs: unable to parse mount options 05:51:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) 05:51:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)) 05:51:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:06 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>', r3}}]}) 05:51:06 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 05:51:06 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 161.131336] hfs: umask requires a value 05:51:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 05:51:06 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) [ 161.156865] hfs: unable to parse mount options 05:51:06 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) 05:51:06 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) 05:51:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 161.270363] FAT-fs (loop3): bogus number of reserved sectors [ 161.276209] FAT-fs (loop3): Can't find a valid FAT filesystem 05:51:06 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) [ 161.349557] hfs: umask requires a value 05:51:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)=':\xa7\x97\nQ+\x17\xa7\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0xb0da8dec915b929d, 0x2}}, 0x20) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) [ 161.378510] hfs: unable to parse mount options 05:51:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:06 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid', 0x3d, r1}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:06 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.threads\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r3, 0x40, 0x2}) [ 161.551178] hfs: umask requires a value 05:51:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 161.586371] hfs: unable to parse mount options [ 161.586420] FAT-fs (loop3): bogus number of reserved sectors [ 161.621877] FAT-fs (loop3): Can't find a valid FAT filesystem 05:51:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) 05:51:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:07 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:07 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x6) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000080)="59653dec6188e8e910ee0f0ab1f11ca81c99a8de4d65954c0e1728b81c3a3158fc71efc8a48507911c284a13794ad33a74df47fdd99b3436920cb328d25de2caac501ee1acc6d8", 0x47) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000000)={0x1, 0x6, 0x81, 0x0, 0x7}) 05:51:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) 05:51:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 161.776723] hfs: umask requires a value [ 161.784451] hfs: unable to parse mount options [ 161.800585] FAT-fs (loop3): bogus number of reserved sectors [ 161.811833] FAT-fs (loop3): Can't find a valid FAT filesystem 05:51:07 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}]}) 05:51:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 161.867125] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) 05:51:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 161.995873] hfs: umask requires a value 05:51:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) [ 162.016703] hfs: unable to parse mount options 05:51:07 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:07 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:07 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 162.047395] FAT-fs (loop3): bogus number of reserved sectors [ 162.076910] FAT-fs (loop3): Can't find a valid FAT filesystem 05:51:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}]}) 05:51:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:07 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 162.215492] hfs: umask requires a value [ 162.219585] hfs: unable to parse mount options [ 162.235097] hfs: umask requires a value [ 162.239097] hfs: unable to parse mount options 05:51:07 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:07 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:07 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 162.327948] FAT-fs (loop3): bogus number of reserved sectors 05:51:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) [ 162.397065] FAT-fs (loop3): Can't find a valid FAT filesystem [ 162.429732] hfs: umask requires a value [ 162.436201] hfs: umask requires a value [ 162.442446] hfs: unable to parse mount options 05:51:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 162.449000] hfs: unable to parse mount options 05:51:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@numtail='nonumtail=0'}]}) 05:51:07 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:07 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 162.626531] FAT-fs (loop3): bogus number of reserved sectors [ 162.651347] FAT-fs (loop3): Can't find a valid FAT filesystem [ 162.658403] hfs: umask requires a value [ 162.668287] hfs: umask requires a value 05:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 162.677436] hfs: unable to parse mount options 05:51:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) [ 162.704567] hfs: unable to parse mount options 05:51:08 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:08 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 162.903024] hfs: umask requires a value [ 162.938634] hfs: unable to parse mount options [ 162.951191] FAT-fs (loop3): bogus number of reserved sectors 05:51:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) [ 162.985929] FAT-fs (loop3): Can't find a valid FAT filesystem [ 163.002575] hfs: umask requires a value 05:51:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 163.032071] hfs: unable to parse mount options 05:51:08 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@utf8='utf8=1'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 05:51:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:08 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 163.176563] hfs: umask requires a value [ 163.192505] hfs: unable to parse mount options 05:51:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) [ 163.232590] FAT-fs (loop3): bogus number of reserved sectors 05:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 163.289863] FAT-fs (loop3): Can't find a valid FAT filesystem [ 163.337286] hfs: umask requires a value [ 163.356337] hfs: unable to parse mount options 05:51:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) [ 163.387000] hfs: umask requires a value [ 163.394003] hfs: unable to parse mount options 05:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:08 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 163.559424] FAT-fs (loop3): bogus number of reserved sectors 05:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:09 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 163.609067] FAT-fs (loop3): Can't find a valid FAT filesystem [ 163.620009] hfs: umask requires a value [ 163.637164] hfs: unable to parse mount options 05:51:09 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) [ 163.790837] hfs: umask requires a value 05:51:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(0x0, 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 163.816903] hfs: unable to parse mount options 05:51:09 executing program 3: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:09 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:09 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 163.926867] hfs: umask requires a value [ 163.938347] hfs: unable to parse mount options 05:51:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(0x0, 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:09 executing program 3: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) 05:51:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 164.088693] hfs: umask requires a value 05:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) [ 164.116177] hfs: unable to parse mount options [ 164.121888] hfs: umask requires a value [ 164.141190] hfs: unable to parse mount options 05:51:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(0x0, 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:09 executing program 3: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 164.281963] hfs: umask requires a value 05:51:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x0, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) [ 164.310846] hfs: unable to parse mount options 05:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(0x0, 0x5, 0x0) close(r1) 05:51:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 164.376918] hfs: umask requires a value [ 164.394727] hfs: unable to parse mount options 05:51:09 executing program 3: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x0, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(0x0, 0x5, 0x0) close(r1) 05:51:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 164.565041] hfs: umask requires a value [ 164.569048] hfs: unable to parse mount options 05:51:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(0x0, 0x5, 0x0) close(r1) 05:51:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x0, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:10 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:10 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x0, 0x0) close(r1) [ 164.717620] hfs: umask requires a value [ 164.733220] hfs: unable to parse mount options [ 164.765028] hfs: umask requires a value [ 164.769183] hfs: unable to parse mount options 05:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x0, 0x0) close(r1) 05:51:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 164.808606] hfs: umask requires a value 05:51:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 164.857257] hfs: unable to parse mount options 05:51:10 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 164.931032] hfs: umask requires a value 05:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x0, 0x0) close(r1) [ 164.957140] hfs: unable to parse mount options 05:51:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:10 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 165.116338] hfs: umask requires a value [ 165.134977] hfs: unable to parse mount options 05:51:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(0xffffffffffffffff) 05:51:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 165.158560] hfs: umask requires a value [ 165.166406] hfs: unable to parse mount options 05:51:10 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:10 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(0xffffffffffffffff) [ 165.297197] hfs: umask requires a value [ 165.303108] hfs: can't find a HFS filesystem on dev loop2 [ 165.309242] hfs: unable to parse mount options 05:51:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(0xffffffffffffffff) 05:51:10 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:10 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 165.539211] hfs: umask requires a value [ 165.544364] hfs: can't find a HFS filesystem on dev loop2 [ 165.573559] hfs: unable to parse mount options 05:51:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:11 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:11 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) open(&(0x7f0000000980)='./bus\x00', 0x100, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) [ 165.828481] hfs: can't find a HFS filesystem on dev loop2 [ 165.828781] hfs: umask requires a value [ 165.846621] hfs: unable to parse mount options 05:51:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:11 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 165.990849] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 166.005819] hfs: umask requires a value [ 166.009818] hfs: unable to parse mount options [ 166.048135] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 166.050178] hfs: unable to parse mount options 05:51:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007ed, &(0x7f0000e68000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9f33d93ed223ba04) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x10, 'lblcr\x00', 0x27}, 0x2c) getsockopt$inet6_tcp_buf(r2, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:11 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) [ 166.220493] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 166.238866] hfs: umask requires a value [ 166.255842] hfs: unable to parse mount options [ 166.267780] hfs: unable to parse mount options 05:51:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x40, 0x2}) 05:51:11 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007ed, &(0x7f0000e68000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9f33d93ed223ba04) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x10, 'lblcr\x00', 0x27}, 0x2c) getsockopt$inet6_tcp_buf(r2, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 05:51:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 05:51:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) [ 166.408391] hfs: umask requires a value [ 166.417198] hfs: umask requires a value [ 166.421739] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 166.421973] hfs: unable to parse mount options 05:51:11 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007ed, &(0x7f0000e68000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9f33d93ed223ba04) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x10, 'lblcr\x00', 0x27}, 0x2c) getsockopt$inet6_tcp_buf(r2, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) [ 166.455443] hfs: unable to parse mount options [ 166.460648] hfs: unable to parse mount options 05:51:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:11 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 166.535192] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 05:51:11 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) [ 166.651149] hfs: umask requires a value 05:51:12 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007ed, &(0x7f0000e68000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9f33d93ed223ba04) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) r2 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 166.681286] hfs: unable to parse mount options 05:51:12 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) [ 166.715392] hfs: umask requires a value [ 166.731569] hfs: unable to parse mount options [ 166.732868] hfs: unable to parse mount options 05:51:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 05:51:12 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007ed, &(0x7f0000e68000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9f33d93ed223ba04) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:12 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 05:51:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 166.908513] hfs: unable to parse mount options 05:51:12 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007ed, &(0x7f0000e68000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9f33d93ed223ba04) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 166.974268] hfs: can't find a HFS filesystem on dev loop3 [ 166.990831] hfs: umask requires a value [ 167.012952] hfs: unable to parse mount options 05:51:12 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x2}) 05:51:12 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:12 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007ed, &(0x7f0000e68000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9f33d93ed223ba04) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) [ 167.142373] hfs: unable to parse mount options 05:51:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)) 05:51:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 05:51:12 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 167.235753] hfs: can't find a HFS filesystem on dev loop3 [ 167.295884] hfs: umask requires a value 05:51:12 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007ed, &(0x7f0000e68000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9f33d93ed223ba04) syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') r1 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) [ 167.319145] hfs: unable to parse mount options 05:51:12 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 167.363261] hfs: umask requires a value [ 167.369351] hfs: unable to parse mount options 05:51:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)) 05:51:12 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffde9, 0x200007ed, &(0x7f0000e68000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9f33d93ed223ba04) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:12 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 167.509655] hfs: umask requires a value [ 167.514009] hfs: can't find a HFS filesystem on dev loop3 [ 167.539044] hfs: unable to parse mount options 05:51:12 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:12 executing program 5: socket$inet(0x2, 0x2, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) [ 167.597603] hfs: umask requires a value [ 167.613291] hfs: unable to parse mount options 05:51:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 05:51:13 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:13 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) [ 167.740606] hfs: unable to parse mount options 05:51:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 05:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 167.799768] hfs: umask requires a value [ 167.812970] hfs: unable to parse mount options [ 167.833555] hfs: umask requires a value 05:51:13 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:13 executing program 5: r0 = socket(0x0, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 167.865634] hfs: unable to parse mount options 05:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 05:51:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 167.982527] hfs: umask requires a value 05:51:13 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}]}) 05:51:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) [ 168.014710] hfs: unable to parse mount options [ 168.022075] hfs: unable to parse mount options 05:51:13 executing program 5: r0 = socket(0x0, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:13 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, 0x0, 0x0) 05:51:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) [ 168.123289] hfs: umask requires a value [ 168.129042] hfs: unable to parse mount options 05:51:13 executing program 5: r0 = socket(0x0, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) [ 168.177728] hfs: unable to parse mount options 05:51:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, 0x0, 0x0) 05:51:13 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) [ 168.271409] hfs: umask requires a value [ 168.299440] hfs: unable to parse mount options 05:51:13 executing program 5: r0 = socket(0xa, 0x0, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) [ 168.359579] hfs: umask requires a value 05:51:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) [ 168.386552] hfs: unable to parse mount options [ 168.404214] hfs: unable to parse mount options 05:51:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, 0x0, 0x0) [ 168.473516] hfs: umask requires a value 05:51:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 05:51:13 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) [ 168.502880] hfs: unable to parse mount options 05:51:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:13 executing program 5: r0 = socket(0xa, 0x0, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="061a6f6679153e17f39af2135ec003961b035382d839eb53d148f284bb895ff137f92aa1ae609c7c83cf693fd1fd2566563cac7335e930d4e023abbfef0034b37149a6adc2ddcd32852a5bf05ae1d4b2a79519568727b600a9e416fa2c32f9347b57bb1e314d02326c14bbceb12272dee76fc88087a534e1c9aa82e20c8ed4e87c8145ad99bd6a5db35b4dcf2a3394cef123758eb75e3f4218da7271a62147487606262ca8486d9fcaa167e8fb213b3b7f5b34672b551b11c97f1999cc4ec20ebf579c1766d75f1c5712ec5c43f3bcbe45126cef579cc0837fc724d1ae5b78cce59d707f34ea085adeb24c1823c8fd545bd9976841d48142434e3440e26d", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 168.598137] hfs: unable to parse mount options 05:51:14 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 05:51:14 executing program 5: r0 = socket(0xa, 0x0, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) [ 168.750701] hfs: unable to parse mount options 05:51:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 05:51:14 executing program 5: socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) [ 168.957167] hfs: unable to parse mount options [ 168.965188] hfs: umask requires a value [ 169.002473] hfs: unable to parse mount options 05:51:14 executing program 5: socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:14 executing program 5: socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) [ 169.205510] hfs: unable to parse mount options [ 169.224321] hfs: umask requires a value 05:51:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 169.249410] hfs: unable to parse mount options 05:51:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:14 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) [ 169.453150] hfs: unable to parse mount options [ 169.471795] hfs: umask requires a value [ 169.493202] hfs: unable to parse mount options 05:51:14 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:14 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000000)=""/101, &(0x7f0000000080)=0x65) 05:51:14 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}]}) 05:51:14 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x2, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000080)) [ 169.756037] hfs: umask requires a value 05:51:15 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) [ 169.784352] hfs: unable to parse mount options 05:51:15 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) 05:51:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="d123e0d73753a9c5e112df7a14de9d82524e557f904ed4ea4951424f77f0f082eed307992df491c1f9a3bbf9384effea092cb61e1a5f48e9ab9105af6fc92dee7ed9d971aa2ca8f1f562a1e648db2afd308b2edcf27668a4925875e5f3804bdfa44d0b96bda26dda592d446faa9e3186a4c8108236179a1ab1898b22afa3f15eb49f07f5beb9ad73862d463a81a08acabd8569f0", 0x94, 0xfffffffffffeffff}, {&(0x7f0000000240)="d33733d771ed9fee69ac3fe25618ec8bdcaa15e07490f47e4a30ceb1dd8a07e44c16d46037c5f8662fb0590179048558c2e87df400bb163634b3b50eed020f391370c4c5d5efeb50205c9fd427a0653477d1d2cea927f3e7d452212facc56a051796e54394efae7cb832222bae71b3052c26b9b86f4e967d5841fd7c117786384e89e3e28508851e3b0f971731af81fccc6d5a34925c1240ac0b43becced2c35ef34a887dc86dcc08ab982c17bee5b18a21208589c8c7ae6dedd21ba9e93ab245b74874da1365571a7099f", 0xcb, 0x7}, {&(0x7f0000000340)="201dd2b5525400897700fc2d57d0150496e3180cccd122201dc26e1d42d902adcbc3379d0190eca9eceea0a056477c0d8f8e6a3cf3a83cd1bdaedb70d796e96953a985756d981878ddd89dd7d59f87e037eb68b2064d377296198cdc6ad6b28c4e26520fd1a6139e07888c1fcdd15ae06d6f3e5081b499c5bf64a2793f35bb802ad2e3905d7892cc055fe05ac1c56a547678665f671c4a72eb724c768c8094e09dbb49dc1e83e6e0f4d9d962a0fd0d52100368", 0xb3, 0xff}, {&(0x7f0000000540)="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", 0xfe, 0x83}, {&(0x7f0000000640)="7fbdc95b9ea53a76b837198b342b4e042a6713f791e7856068cb93d426508160de3aa69b13b3684fc9f64f900fe4434f4bf93b018c6a806fd86b8262662ca437c6513965a83c0077bbebc0d38a9048e55350c139f3088c9156af7403748b1a84c84056ef59b9f81f266a6a8c64a50dd3dff3f6ce3e902d10cdf78982d0d82432aec8a887a39dab21800cd7f6cdfb3af4c0cf5a65ed5565eb396559d795ab891492971963e971a34f9f198b0abc10c1543a71edc184ab6a3f7e158109ff2a", 0xbe, 0x5}, {&(0x7f0000000400)="876cee19563c", 0x6, 0x101}], 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, 0x0, 0x0) 05:51:15 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) [ 169.987701] hfs: umask requires a value 05:51:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, 0x0, 0x0) 05:51:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x2) [ 170.022489] hfs: unable to parse mount options 05:51:15 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) 05:51:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, 0x0, 0x0) 05:51:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x2) [ 170.202877] hfs: umask requires a value [ 170.229456] hfs: unable to parse mount options 05:51:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:15 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="ee9e47f5", @ANYRES16=r5, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20080480}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r5, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000000) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x97fdfba234815327, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r9 = dup2(r8, r0) r10 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r11 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r12 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a610cc}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x50, r5, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x2000000) 05:51:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x2) 05:51:15 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x2) [ 170.444934] hfs: can't find a HFS filesystem on dev loop1 [ 170.481431] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 170.556687] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:15 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:15 executing program 3: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x2) 05:51:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="ee9e47f5", @ANYRES16=r5, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20080480}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r5, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000000) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x97fdfba234815327, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r9 = dup2(r8, r0) r10 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r11 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r12 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a610cc}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x50, r5, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x2000000) [ 170.599189] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:16 executing program 3: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x2) [ 170.749703] hfs: can't find a HFS filesystem on dev loop1 05:51:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) [ 170.824144] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 170.844943] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:16 executing program 3: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x2) [ 170.896004] hfs: can't find a HFS filesystem on dev loop2 [ 170.899812] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 170.970944] hfs: can't find a HFS filesystem on dev loop1 05:51:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff", 0x1c}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x2) 05:51:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") close(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r7, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) 05:51:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x2) [ 171.147182] hfs: unable to parse mount options [ 171.152333] hfs: can't find a HFS filesystem on dev loop2 05:51:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") close(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") close(0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x2) [ 171.351243] hfs: can't find a HFS filesystem on dev loop2 05:51:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) [ 171.396253] hfs: unable to parse mount options 05:51:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:16 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 171.558123] hfs: unable to parse mount options [ 171.590356] hfs: unable to parse mount options 05:51:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r7, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) 05:51:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:17 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x2) 05:51:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:17 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) [ 171.726801] hfs: unable to parse mount options [ 171.739155] hfs: unable to parse mount options 05:51:17 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x2) 05:51:17 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:17 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 171.924881] hfs: unable to parse mount options [ 171.969268] hfs: unable to parse mount options 05:51:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r7, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) 05:51:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:17 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0x2) 05:51:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:17 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:17 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 05:51:17 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 172.194952] hfs: unable to parse mount options 05:51:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) [ 172.235606] hfs: unable to parse mount options 05:51:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:17 executing program 2: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask'}}]}) [ 172.423115] hfs: can't find a HFS filesystem on dev loop2 [ 172.424839] hfs: umask requires a value [ 172.461585] hfs: unable to parse mount options 05:51:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) 05:51:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 05:51:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 05:51:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) [ 172.627231] hfs: umask requires a value [ 172.656561] hfs: unable to parse mount options 05:51:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask', 0x3d, 0x80000001}}], [{@uid_gt={'uid>'}}]}) 05:51:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)) [ 172.783626] hfs: unable to parse mount options [ 172.848543] hfs: umask requires a value [ 172.869924] hfs: unable to parse mount options 05:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:18 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 05:51:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask', 0x3d, 0x80000001}}]}) 05:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) [ 173.037603] hfs: umask requires a value [ 173.041330] hfs: unable to parse mount options [ 173.067625] hfs: unable to parse mount options 05:51:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) [ 173.212750] hfs: unable to parse mount options 05:51:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 173.323781] hfs: unable to parse mount options 05:51:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) [ 173.411036] hfs: unable to parse mount options [ 173.516410] hfs: unable to parse mount options 05:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) 05:51:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) 05:51:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 173.663997] hfs: unable to parse mount options [ 173.703126] hfs: unable to parse mount options 05:51:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 173.866401] hfs: unable to parse mount options [ 173.883888] hfs: unable to parse mount options 05:51:19 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) [ 174.079724] hfs: unable to parse mount options 05:51:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) 05:51:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:19 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) 05:51:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) [ 174.316166] hfs: unable to parse mount options 05:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) [ 174.395799] hfs: unable to parse mount options 05:51:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:19 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) [ 174.522721] hfs: unable to parse mount options [ 174.616353] hfs: unable to parse mount options 05:51:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 05:51:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:20 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 05:51:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 05:51:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) [ 174.834497] hfs: unable to parse mount options 05:51:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 174.876630] hfs: unable to parse mount options 05:51:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:20 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) [ 175.009700] hfs: unable to parse mount options 05:51:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 175.115634] hfs: unable to parse mount options 05:51:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) 05:51:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) 05:51:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) 05:51:20 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) 05:51:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) [ 175.431024] hfs: unable to parse mount options [ 175.441086] hfs: unable to parse mount options 05:51:20 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) [ 175.614160] hfs: unable to parse mount options [ 175.615891] hfs: unable to parse mount options 05:51:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) 05:51:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:51:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 05:51:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) [ 176.001941] hfs: unable to parse mount options 05:51:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) [ 176.033622] hfs: unable to parse mount options 05:51:21 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(0x0, 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 176.191819] hfs: unable to parse mount options 05:51:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) [ 176.256074] hfs: unable to parse mount options [ 176.398805] hfs: unable to parse mount options 05:51:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) 05:51:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(0x0, 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(0x0, 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 176.633432] hfs: unable to parse mount options [ 176.642153] hfs: unable to parse mount options 05:51:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) 05:51:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x0, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 176.847566] hfs: unable to parse mount options [ 176.862071] hfs: unable to parse mount options 05:51:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x0, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 177.124942] hfs: unable to parse mount options 05:51:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x0, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:51:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) [ 177.279239] hfs: unable to parse mount options 05:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 177.309807] hfs: unable to parse mount options 05:51:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 177.478789] hfs: unable to parse mount options 05:51:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) [ 177.525435] hfs: unable to parse mount options 05:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 177.647630] hfs: unable to parse mount options 05:51:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') [ 177.904784] hfs: unable to parse mount options 05:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 177.933309] hfs: unable to parse mount options 05:51:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) [ 178.092912] hfs: unable to parse mount options [ 178.111057] hfs: unable to parse mount options 05:51:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) [ 178.294225] hfs: unable to parse mount options [ 178.307551] hfs: unable to parse mount options 05:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) [ 178.489128] hfs: unable to parse mount options [ 178.536598] hfs: unable to parse mount options 05:51:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 05:51:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) [ 178.677420] hfs: unable to parse mount options 05:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) 05:51:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 178.716562] hfs: unable to parse mount options 05:51:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 178.859250] hfs: unable to parse mount options 05:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) 05:51:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) [ 179.156490] hfs: unable to parse mount options 05:51:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) [ 179.228490] hfs: unable to parse mount options 05:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) [ 179.312117] hfs: unable to parse mount options 05:51:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) [ 179.480559] hfs: unable to parse mount options [ 179.497414] hfs: unable to parse mount options 05:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) 05:51:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) [ 179.645872] hfs: unable to parse mount options [ 179.736708] hfs: unable to parse mount options 05:51:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 179.929417] hfs: unable to parse mount options [ 179.942930] hfs: unable to parse mount options 05:51:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 180.100705] hfs: unable to parse mount options 05:51:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 180.319746] hfs: unable to parse mount options 05:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 05:51:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, 0x0, 0x0) 05:51:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, 0x0, 0x0) 05:51:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, 0x0, 0x0) 05:51:26 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) 05:51:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:26 executing program 5: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) [ 181.249723] hfs: can't find a HFS filesystem on dev loop2 05:51:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8}, 0x10) 05:51:26 executing program 5: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 181.481815] hfs: can't find a HFS filesystem on dev loop2 05:51:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 5: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 5: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 181.746526] hfs: can't find a HFS filesystem on dev loop1 [ 181.756492] hfs: can't find a HFS filesystem on dev loop2 05:51:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:27 executing program 5: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 181.944637] hfs: unable to parse mount options [ 181.962688] hfs: can't find a HFS filesystem on dev loop1 05:51:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:51:27 executing program 5: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 182.124634] hfs: unable to parse mount options 05:51:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) [ 182.178471] hfs: can't find a HFS filesystem on dev loop1 05:51:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 3: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[], [{@uid_gt={'uid>'}}]}) [ 182.365668] hfs: unable to parse mount options [ 182.444354] hfs: unable to parse mount options 05:51:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 3: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:27 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 05:51:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 182.606139] hfs: unable to parse mount options [ 182.606800] hfs: can't find a HFS filesystem on dev loop1 05:51:28 executing program 3: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 05:51:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 182.803903] hfs: unable to parse mount options [ 182.820940] hfs: can't find a HFS filesystem on dev loop1 05:51:28 executing program 3: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@umask={'umask'}}], [{@uid_gt={'uid>'}}]}) 05:51:28 executing program 4: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)) 05:51:28 executing program 3: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 183.105587] hfs: can't find a HFS filesystem on dev loop1 [ 183.131539] hfs: unable to parse mount options 05:51:28 executing program 3: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}], [{@uid_gt={'uid>'}}]}) 05:51:28 executing program 4: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}]}) 05:51:28 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 183.268437] hfs: unable to parse mount options [ 183.318303] hfs: can't find a HFS filesystem on dev loop2 05:51:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) 05:51:28 executing program 4: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}]}) 05:51:28 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:28 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 183.529701] hfs: can't find a HFS filesystem on dev loop2 05:51:28 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@uid={'uid'}}, {@umask={'umask'}}]}) 05:51:29 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 183.721682] hfs: can't find a HFS filesystem on dev loop2 05:51:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) 05:51:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:29 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) 05:51:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:51:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:51:29 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 05:51:29 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:29 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:51:30 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:30 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 05:51:30 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:51:30 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 05:51:30 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:30 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) 05:51:31 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:51:31 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:32 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 0: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 0: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 0: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 0: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:34 executing program 0: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:34 executing program 0: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:34 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 2: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 2: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:34 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 2: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 2: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 2: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 2: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:35 executing program 1: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 1: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:35 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 1: r0 = socket(0x0, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:35 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:36 executing program 1: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 1: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 1: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:36 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:36 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) 05:51:36 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:51:36 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:36 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) 05:51:37 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:37 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:37 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) 05:51:38 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) 05:51:38 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) 05:51:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:38 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:51:38 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) 05:51:38 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) 05:51:38 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) 05:51:38 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 4: r0 = socket(0x0, 0x4000000000080002, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) 05:51:38 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 05:51:38 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 4: r0 = socket(0x0, 0x4000000000080002, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) 05:51:38 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:51:39 executing program 4: r0 = socket(0x0, 0x4000000000080002, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) 05:51:39 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) 05:51:39 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) 05:51:39 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) 05:51:39 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 4: socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) 05:51:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) 05:51:39 executing program 4: socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) 05:51:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) 05:51:39 executing program 4: socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) 05:51:39 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:39 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 05:51:40 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 05:51:40 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3f020000000000005d0002000000000000000c4100000014001462726f616463e173742d6c696e6b02004e92979949cbe4cf517df803aa2b281dba"], 0x30}}, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010b}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40) 05:51:40 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 05:51:40 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 4: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f0000000200)=0x57, 0x81800) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{0x9, 0x8, 0x3, 0x401}, {0xff, 0x8, 0x7}, {0x9e, 0x80, 0x9, 0x4}, {0xbc3b, 0x2, 0xb6, 0x7f}, {0x891, 0x7b, 0x84, 0x3}, {0x486, 0x9, 0x6, 0x2}]}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 05:51:40 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40, 0x48) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/1420], 0x58c) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x12, 0x1, 0xfffffffa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:40 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r2 = socket(0x11, 0x2, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)={r4, 0x40, 0x3, [0x9, 0xfff9, 0x8000]}, &(0x7f0000000040)=0xe) 05:51:40 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x16, 0x0, r3, 0xfffffffffffffffd, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r4, r5, 0x0, 0x80000003) socket(0x8, 0x2, 0x2) 05:51:40 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40, 0x48) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/1420], 0x58c) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x12, 0x1, 0xfffffffa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 195.242187] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x16, 0x0, r3, 0xfffffffffffffffd, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r4, r5, 0x0, 0x80000003) socket(0x8, 0x2, 0x2) 05:51:40 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40, 0x48) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/1420], 0x58c) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x12, 0x1, 0xfffffffa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x16, 0x0, r3, 0xfffffffffffffffd, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r4, r5, 0x0, 0x80000003) socket(0x8, 0x2, 0x2) 05:51:40 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:40 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:41 executing program 4: socket$netlink(0x10, 0x3, 0xc) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, r0) 05:51:41 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40, 0x48) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/1420], 0x58c) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x12, 0x1, 0xfffffffa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) 05:51:41 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x16, 0x0, r3, 0xfffffffffffffffd, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r4, r5, 0x0, 0x80000003) socket(0x8, 0x2, 0x2) 05:51:41 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:41 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:41 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:41 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40, 0x48) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c46fd013f80010000000000000003000600020000004f0300000000000040000000000000006a030000000000000300000009003800010001010700ff0000000060000100000600000000000000000000000000000002000000000000000300000000000000ffffffffffffffffec0d00000000000005000000040000000900000000000000ff010000000000000900000000000000060000000000000060000000000000007f00000000000000710d353200e96ead9729a44754c5c5f462e3735c80cbd3bbbb80f7cbdbb997763f893eeb69a5e0e74bd45600b18f8924430c9e59a6d038f386a84009416040c3f14b122fc1b50ae304fc5aeba04fe835335eaff112dd6fc129ece547c079fa1b0728d4bad702d5f40e06a7df695f63a47eab8cd8546bb2c0fa64472bad6fe16dc98760db8b274b8d225d07fef1bc9ea4ff24d2a4533cb00234d6d34aa9f30cfb1866777f79e205514f64113dee859205c605bffa2486e69ff9357924444989802e54d5c5dd1ffc2db429c4499bdfa049f7d5a0c2743537dc9267553d510fbefa861e00"/1420], 0x58c) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) 05:51:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x48002, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="dd069685dfe21df37154c897d0b90c0a", 0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) 05:51:41 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:41 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40, 0x48) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x48002, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="dd069685dfe21df37154c897d0b90c0a", 0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) 05:51:41 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x14482, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x20) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x0, 0x3) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x88) lseek(r2, 0x0, 0x3) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) read$eventfd(r3, 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x10000, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000000c0)) 05:51:41 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:41 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:41 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:41 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40, 0x48) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x4, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") set_robust_list(&(0x7f0000000100)={0x0, 0x6, &(0x7f0000000080)}, 0x18) r4 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) kcmp(0x0, r2, 0x5, r3, r4) 05:51:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r2, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000480)={0x88, r2, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x933e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x40000) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x800, 0x88040) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r7 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r7, 0x0) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r8, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r7, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000480)={0x88, r8, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x933e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x40000) sendmsg$TIPC_NL_SOCK_GET(r6, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0xf4, r8, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xc973}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_NODE={0x4c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff5698}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x981b}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4}, 0x8010) sendfile(r4, r5, 0x0, 0x8000fffffffe) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14, 0x800) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r11, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) getsockname$packet(r11, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000006c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000740)=0x14) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r17}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r17}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r17}]]}}}]}, 0x38}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000008c0)=0x14) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r22}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r22}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r22}]]}}}]}, 0x38}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0}, &(0x7f0000000980)=0x14) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) r26 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r26, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r25, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r27}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r27}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r27}]]}}}]}, 0x38}}, 0x0) r28 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r28, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000c00)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x440000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000c40)={0x334, r9, 0x300, 0x70bd29, 0x25dfdbfc, {}, [{{0x8, 0x1, r10}, {0x138, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffc0}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r22}, {0x1d8, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r23}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}]}}]}, 0x334}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r31 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r32 = ioctl$KVM_CREATE_VCPU(r31, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r32, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) 05:51:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x48002, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="dd069685dfe21df37154c897d0b90c0a", 0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) [ 196.528004] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:41 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40, 0x48) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x4, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") set_robust_list(&(0x7f0000000100)={0x0, 0x6, &(0x7f0000000080)}, 0x18) r4 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) kcmp(0x0, r2, 0x5, r3, r4) 05:51:41 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x48002, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="dd069685dfe21df37154c897d0b90c0a", 0x10) [ 196.596244] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:42 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:42 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x48002, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) 05:51:42 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40, 0x48) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) [ 196.718206] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x4, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") set_robust_list(&(0x7f0000000100)={0x0, 0x6, &(0x7f0000000080)}, 0x18) r4 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) kcmp(0x0, r2, 0x5, r3, r4) 05:51:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x48002, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) 05:51:42 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) [ 196.905604] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:42 executing program 3: r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@local, @initdev}, &(0x7f0000000040)=0xc) io_destroy(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000340)) 05:51:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x4, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") set_robust_list(&(0x7f0000000100)={0x0, 0x6, &(0x7f0000000080)}, 0x18) r2 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) 05:51:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x48002, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) 05:51:42 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:42 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:42 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x4, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") set_robust_list(&(0x7f0000000100)={0x0, 0x6, &(0x7f0000000080)}, 0x18) socket(0xa, 0x6, 0x0) 05:51:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x48002, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) [ 197.104553] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:42 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:42 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) 05:51:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x4, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") set_robust_list(&(0x7f0000000100)={0x0, 0x6, &(0x7f0000000080)}, 0x18) 05:51:42 executing program 3: r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@local, @initdev}, &(0x7f0000000040)=0xc) io_destroy(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000340)) 05:51:42 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:42 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) 05:51:42 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:42 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x4, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") set_robust_list(&(0x7f0000000100)={0x0, 0x6, &(0x7f0000000080)}, 0x18) 05:51:42 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:42 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) 05:51:42 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 05:51:42 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) 05:51:42 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x4, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") 05:51:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:43 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:43 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:43 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000080)={'ip6gre0\x00', 0xe12}) 05:51:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) 05:51:43 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:43 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000700)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r0, 0x0, 0x0, 0x0) 05:51:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, 0x0) 05:51:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) 05:51:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x0, 0x3) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000100)) ftruncate(r5, 0x800fe) ioctl$BLKREPORTZONE(r5, 0xc0101282, &(0x7f0000000080)={0x200, 0x1, 0x0, [{0x400, 0x1, 0x8, 0x7f, 0xec, 0xb3}]}) 05:51:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000980)='./bus\x00', 0x100, 0x0) r2 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x1c, r4, 0x403, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x3}]}, 0x1c}}, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000880)='fou\x00') sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000e0}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x38, r5, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x9c86871b0db3bafa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x10000000}, 0x1) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20400}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)={0x34, r4, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x27}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x34}}, 0x24080091) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000007c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f62650909118d1813fbe29a095adc122f567467e2574267bb4f1977286bd0d1016662272d8902fd2d52142b", @ANYRES16=r6, @ANYBLOB="000828bd9200fedbdf2506000000180007000c000300070000000000000008000100bb31000028000110100001400000000000000031000000001400020008000400017b00000800020006000000"], 0x3}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000480)={0x88, r6, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x933e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x40000) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x3, {0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffff}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000080), r7}}, 0x18) r8 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) r9 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r10 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x42e}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r10, 0x84, 0x6c, &(0x7f0000000640)={r11, 0xfb, "5257aa4160651fe8ac89296393f393da279b088c6797ef6ffb543fe19dcc0e07986ca415eb68fac86b5391a64c7735a151ed7ea3b65a46172acf1cdef42621a7d7c6b28262d48dd17d828364b4a174dd7bc7c212abe146bbfa4a33ffec0ac287659661f26bd6c96cfaab439695b0d34a82a5400f85b8c723aede86a82fb8ca88ad4e57fb7148c907d67ce30314ad7c7450c70e22b390512b6e32808e8bb40a98743cf92db4db48928fc89e46840aee385a15655ae8c88eefd853a885678889918a274849098c24f4bb2e21a4e3325fe2f220df4efb356c622e349108731b4c836bc534764cc9f7e9dd7002ffc1b76ec7949d22107f0620b1c517db"}, &(0x7f0000000380)=0x103) ftruncate(r9, 0x800fe) 05:51:43 executing program 5: mkdir(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:43 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000640)={0x12c, r1, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0xac, 0x1, '\x13u~>\x87\xee\x01\x00BU\x1a\xc9\xa0\xe9\xfcun|\xa1,\xa7\xec\x1d\xf0\x92\x01X\a\x92\xa3\xbd\tDKg[2Z\xa8\xe2\xfa\x86\xfe\xf2\xbe\x05\xeb\xd5\"_\x03D\xb8z\xff\x19\x8e\xae\x94|P{[\x94\x9a\xea\xae\x9ek<\x1dE{9\xde\r\xf3/]\x19\xf2g6x\x02S\v\xa9\x0e\xc4\x9c 3\xd1W\rF\xc7\x02x\xf1\xb8\xd6\xff\xbbH\xdb\xa7E\"\xb5\x1f\v\xce\x12\"\x1c$\x16\xa2;E{\x83\x9a\xc2\x89\x8b\x86\x96\x06\n\xb2Gy\xcc\x81\x9e\'\x95\x9f\xa0#\xb2\x14bn\x80*!\x12j@v\x16\az\xa8f\xf7\\\xe7v\xa1\x91'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x6, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c}, @TIPC_NLA_MEDIA_NAME={0xfffffffffffffe91, 0x1, 'ib\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x1, 0x11, 0x6, 0x6, "2c39d5ed3dfbd2cb5293b9fd000d2921afe94a909e5857d610f7d255c436603e"}) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) dup2(0xffffffffffffffff, r1) 05:51:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x2) ftruncate(r1, 0x800fe) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) [ 198.093116] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:43 executing program 5: mkdir(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) dup2(0xffffffffffffffff, r1) 05:51:43 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000640)={0x12c, r1, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0xac, 0x1, '\x13u~>\x87\xee\x01\x00BU\x1a\xc9\xa0\xe9\xfcun|\xa1,\xa7\xec\x1d\xf0\x92\x01X\a\x92\xa3\xbd\tDKg[2Z\xa8\xe2\xfa\x86\xfe\xf2\xbe\x05\xeb\xd5\"_\x03D\xb8z\xff\x19\x8e\xae\x94|P{[\x94\x9a\xea\xae\x9ek<\x1dE{9\xde\r\xf3/]\x19\xf2g6x\x02S\v\xa9\x0e\xc4\x9c 3\xd1W\rF\xc7\x02x\xf1\xb8\xd6\xff\xbbH\xdb\xa7E\"\xb5\x1f\v\xce\x12\"\x1c$\x16\xa2;E{\x83\x9a\xc2\x89\x8b\x86\x96\x06\n\xb2Gy\xcc\x81\x9e\'\x95\x9f\xa0#\xb2\x14bn\x80*!\x12j@v\x16\az\xa8f\xf7\\\xe7v\xa1\x91'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x6, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c}, @TIPC_NLA_MEDIA_NAME={0xfffffffffffffe91, 0x1, 'ib\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x1, 0x11, 0x6, 0x6, "2c39d5ed3dfbd2cb5293b9fd000d2921afe94a909e5857d610f7d255c436603e"}) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 198.225611] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 198.242235] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) [ 198.273665] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:43 executing program 5: mkdir(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x0, 0x3) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000100)) ftruncate(r5, 0x800fe) ioctl$BLKREPORTZONE(r5, 0xc0101282, &(0x7f0000000080)={0x200, 0x1, 0x0, [{0x400, 0x1, 0x8, 0x7f, 0xec, 0xb3}]}) 05:51:43 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x8, 0x3}, 0xc) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) dup2(0xffffffffffffffff, r1) 05:51:43 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000640)={0x12c, r1, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0xac, 0x1, '\x13u~>\x87\xee\x01\x00BU\x1a\xc9\xa0\xe9\xfcun|\xa1,\xa7\xec\x1d\xf0\x92\x01X\a\x92\xa3\xbd\tDKg[2Z\xa8\xe2\xfa\x86\xfe\xf2\xbe\x05\xeb\xd5\"_\x03D\xb8z\xff\x19\x8e\xae\x94|P{[\x94\x9a\xea\xae\x9ek<\x1dE{9\xde\r\xf3/]\x19\xf2g6x\x02S\v\xa9\x0e\xc4\x9c 3\xd1W\rF\xc7\x02x\xf1\xb8\xd6\xff\xbbH\xdb\xa7E\"\xb5\x1f\v\xce\x12\"\x1c$\x16\xa2;E{\x83\x9a\xc2\x89\x8b\x86\x96\x06\n\xb2Gy\xcc\x81\x9e\'\x95\x9f\xa0#\xb2\x14bn\x80*!\x12j@v\x16\az\xa8f\xf7\\\xe7v\xa1\x91'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x6, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c}, @TIPC_NLA_MEDIA_NAME={0xfffffffffffffe91, 0x1, 'ib\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x1, 0x11, 0x6, 0x6, "2c39d5ed3dfbd2cb5293b9fd000d2921afe94a909e5857d610f7d255c436603e"}) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:43 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) 05:51:43 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:43 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000640)={0x12c, r1, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0xac, 0x1, '\x13u~>\x87\xee\x01\x00BU\x1a\xc9\xa0\xe9\xfcun|\xa1,\xa7\xec\x1d\xf0\x92\x01X\a\x92\xa3\xbd\tDKg[2Z\xa8\xe2\xfa\x86\xfe\xf2\xbe\x05\xeb\xd5\"_\x03D\xb8z\xff\x19\x8e\xae\x94|P{[\x94\x9a\xea\xae\x9ek<\x1dE{9\xde\r\xf3/]\x19\xf2g6x\x02S\v\xa9\x0e\xc4\x9c 3\xd1W\rF\xc7\x02x\xf1\xb8\xd6\xff\xbbH\xdb\xa7E\"\xb5\x1f\v\xce\x12\"\x1c$\x16\xa2;E{\x83\x9a\xc2\x89\x8b\x86\x96\x06\n\xb2Gy\xcc\x81\x9e\'\x95\x9f\xa0#\xb2\x14bn\x80*!\x12j@v\x16\az\xa8f\xf7\\\xe7v\xa1\x91'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x6, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c}, @TIPC_NLA_MEDIA_NAME={0xfffffffffffffe91, 0x1, 'ib\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x1, 0x11, 0x6, 0x6, "2c39d5ed3dfbd2cb5293b9fd000d2921afe94a909e5857d610f7d255c436603e"}) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) 05:51:43 executing program 3: socket$netlink(0x10, 0x3, 0xc) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, r0) 05:51:43 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) 05:51:43 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:44 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000640)={0x12c, r1, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0xac, 0x1, '\x13u~>\x87\xee\x01\x00BU\x1a\xc9\xa0\xe9\xfcun|\xa1,\xa7\xec\x1d\xf0\x92\x01X\a\x92\xa3\xbd\tDKg[2Z\xa8\xe2\xfa\x86\xfe\xf2\xbe\x05\xeb\xd5\"_\x03D\xb8z\xff\x19\x8e\xae\x94|P{[\x94\x9a\xea\xae\x9ek<\x1dE{9\xde\r\xf3/]\x19\xf2g6x\x02S\v\xa9\x0e\xc4\x9c 3\xd1W\rF\xc7\x02x\xf1\xb8\xd6\xff\xbbH\xdb\xa7E\"\xb5\x1f\v\xce\x12\"\x1c$\x16\xa2;E{\x83\x9a\xc2\x89\x8b\x86\x96\x06\n\xb2Gy\xcc\x81\x9e\'\x95\x9f\xa0#\xb2\x14bn\x80*!\x12j@v\x16\az\xa8f\xf7\\\xe7v\xa1\x91'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x6, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c}, @TIPC_NLA_MEDIA_NAME={0xfffffffffffffe91, 0x1, 'ib\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x1, 0x11, 0x6, 0x6, "2c39d5ed3dfbd2cb5293b9fd000d2921afe94a909e5857d610f7d255c436603e"}) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) [ 198.627636] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 198.705338] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x0, 0x3) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000100)) ftruncate(r5, 0x800fe) ioctl$BLKREPORTZONE(r5, 0xc0101282, &(0x7f0000000080)={0x200, 0x1, 0x0, [{0x400, 0x1, 0x8, 0x7f, 0xec, 0xb3}]}) 05:51:44 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:44 executing program 3: socket$netlink(0x10, 0x3, 0xc) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, r0) 05:51:44 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) 05:51:44 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:44 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000640)={0x12c, r1, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0xac, 0x1, '\x13u~>\x87\xee\x01\x00BU\x1a\xc9\xa0\xe9\xfcun|\xa1,\xa7\xec\x1d\xf0\x92\x01X\a\x92\xa3\xbd\tDKg[2Z\xa8\xe2\xfa\x86\xfe\xf2\xbe\x05\xeb\xd5\"_\x03D\xb8z\xff\x19\x8e\xae\x94|P{[\x94\x9a\xea\xae\x9ek<\x1dE{9\xde\r\xf3/]\x19\xf2g6x\x02S\v\xa9\x0e\xc4\x9c 3\xd1W\rF\xc7\x02x\xf1\xb8\xd6\xff\xbbH\xdb\xa7E\"\xb5\x1f\v\xce\x12\"\x1c$\x16\xa2;E{\x83\x9a\xc2\x89\x8b\x86\x96\x06\n\xb2Gy\xcc\x81\x9e\'\x95\x9f\xa0#\xb2\x14bn\x80*!\x12j@v\x16\az\xa8f\xf7\\\xe7v\xa1\x91'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x6, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c}, @TIPC_NLA_MEDIA_NAME={0xfffffffffffffe91, 0x1, 'ib\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x1, 0x11, 0x6, 0x6, "2c39d5ed3dfbd2cb5293b9fd000d2921afe94a909e5857d610f7d255c436603e"}) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) 05:51:44 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) 05:51:44 executing program 3: socket$netlink(0x10, 0x3, 0xc) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, r0) 05:51:44 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000640)={0x12c, r1, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0xac, 0x1, '\x13u~>\x87\xee\x01\x00BU\x1a\xc9\xa0\xe9\xfcun|\xa1,\xa7\xec\x1d\xf0\x92\x01X\a\x92\xa3\xbd\tDKg[2Z\xa8\xe2\xfa\x86\xfe\xf2\xbe\x05\xeb\xd5\"_\x03D\xb8z\xff\x19\x8e\xae\x94|P{[\x94\x9a\xea\xae\x9ek<\x1dE{9\xde\r\xf3/]\x19\xf2g6x\x02S\v\xa9\x0e\xc4\x9c 3\xd1W\rF\xc7\x02x\xf1\xb8\xd6\xff\xbbH\xdb\xa7E\"\xb5\x1f\v\xce\x12\"\x1c$\x16\xa2;E{\x83\x9a\xc2\x89\x8b\x86\x96\x06\n\xb2Gy\xcc\x81\x9e\'\x95\x9f\xa0#\xb2\x14bn\x80*!\x12j@v\x16\az\xa8f\xf7\\\xe7v\xa1\x91'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x6, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c}, @TIPC_NLA_MEDIA_NAME={0xfffffffffffffe91, 0x1, 'ib\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x1, 0x11, 0x6, 0x6, "2c39d5ed3dfbd2cb5293b9fd000d2921afe94a909e5857d610f7d255c436603e"}) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) 05:51:44 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:44 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) [ 198.969801] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 199.032664] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r6, 0x0, 0x3) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000100)) ftruncate(r5, 0x800fe) 05:51:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:44 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000640)={0x12c, r1, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0xac, 0x1, '\x13u~>\x87\xee\x01\x00BU\x1a\xc9\xa0\xe9\xfcun|\xa1,\xa7\xec\x1d\xf0\x92\x01X\a\x92\xa3\xbd\tDKg[2Z\xa8\xe2\xfa\x86\xfe\xf2\xbe\x05\xeb\xd5\"_\x03D\xb8z\xff\x19\x8e\xae\x94|P{[\x94\x9a\xea\xae\x9ek<\x1dE{9\xde\r\xf3/]\x19\xf2g6x\x02S\v\xa9\x0e\xc4\x9c 3\xd1W\rF\xc7\x02x\xf1\xb8\xd6\xff\xbbH\xdb\xa7E\"\xb5\x1f\v\xce\x12\"\x1c$\x16\xa2;E{\x83\x9a\xc2\x89\x8b\x86\x96\x06\n\xb2Gy\xcc\x81\x9e\'\x95\x9f\xa0#\xb2\x14bn\x80*!\x12j@v\x16\az\xa8f\xf7\\\xe7v\xa1\x91'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x6, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c}, @TIPC_NLA_MEDIA_NAME={0xfffffffffffffe91, 0x1, 'ib\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x1, 0x11, 0x6, 0x6, "2c39d5ed3dfbd2cb5293b9fd000d2921afe94a909e5857d610f7d255c436603e"}) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) 05:51:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) 05:51:44 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:44 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:44 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000640)={0x12c, r1, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0xac, 0x1, '\x13u~>\x87\xee\x01\x00BU\x1a\xc9\xa0\xe9\xfcun|\xa1,\xa7\xec\x1d\xf0\x92\x01X\a\x92\xa3\xbd\tDKg[2Z\xa8\xe2\xfa\x86\xfe\xf2\xbe\x05\xeb\xd5\"_\x03D\xb8z\xff\x19\x8e\xae\x94|P{[\x94\x9a\xea\xae\x9ek<\x1dE{9\xde\r\xf3/]\x19\xf2g6x\x02S\v\xa9\x0e\xc4\x9c 3\xd1W\rF\xc7\x02x\xf1\xb8\xd6\xff\xbbH\xdb\xa7E\"\xb5\x1f\v\xce\x12\"\x1c$\x16\xa2;E{\x83\x9a\xc2\x89\x8b\x86\x96\x06\n\xb2Gy\xcc\x81\x9e\'\x95\x9f\xa0#\xb2\x14bn\x80*!\x12j@v\x16\az\xa8f\xf7\\\xe7v\xa1\x91'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x6, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c}, @TIPC_NLA_MEDIA_NAME={0xfffffffffffffe91, 0x1, 'ib\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x1, 0x11, 0x6, 0x6, "2c39d5ed3dfbd2cb5293b9fd000d2921afe94a909e5857d610f7d255c436603e"}) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) 05:51:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:44 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:44 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) 05:51:44 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000640)={0x12c, r1, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0xac, 0x1, '\x13u~>\x87\xee\x01\x00BU\x1a\xc9\xa0\xe9\xfcun|\xa1,\xa7\xec\x1d\xf0\x92\x01X\a\x92\xa3\xbd\tDKg[2Z\xa8\xe2\xfa\x86\xfe\xf2\xbe\x05\xeb\xd5\"_\x03D\xb8z\xff\x19\x8e\xae\x94|P{[\x94\x9a\xea\xae\x9ek<\x1dE{9\xde\r\xf3/]\x19\xf2g6x\x02S\v\xa9\x0e\xc4\x9c 3\xd1W\rF\xc7\x02x\xf1\xb8\xd6\xff\xbbH\xdb\xa7E\"\xb5\x1f\v\xce\x12\"\x1c$\x16\xa2;E{\x83\x9a\xc2\x89\x8b\x86\x96\x06\n\xb2Gy\xcc\x81\x9e\'\x95\x9f\xa0#\xb2\x14bn\x80*!\x12j@v\x16\az\xa8f\xf7\\\xe7v\xa1\x91'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x6, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c}, @TIPC_NLA_MEDIA_NAME={0xfffffffffffffe91, 0x1, 'ib\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) [ 199.354288] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 199.373150] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x0, 0x3) ioctl$VHOST_VSOCK_SET_RUNNING(r5, 0x4004af61, &(0x7f0000000100)) 05:51:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:44 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) 05:51:44 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:44 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:44 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16=r1, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) 05:51:44 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:44 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) 05:51:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, 0xffffffffffffffff) 05:51:44 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:44 executing program 1: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) [ 199.596855] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 199.632935] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x0, 0x3) 05:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, 0xffffffffffffffff) 05:51:45 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) 05:51:45 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:45 executing program 1: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 4: r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) 05:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, 0xffffffffffffffff) 05:51:45 executing program 1: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, 0x0) 05:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, r0) 05:51:45 executing program 4: open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) [ 199.904420] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 199.969898] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:45 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:45 executing program 1: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, r0) 05:51:45 executing program 4: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) 05:51:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) creat(&(0x7f00000000c0)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 05:51:45 executing program 1: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) 05:51:45 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, r0) 05:51:45 executing program 1: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) [ 200.248438] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 200.286805] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:45 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:45 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 1: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 05:51:45 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='minix\x00', 0x0, 0x0) [ 200.408950] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pig=16685 comm=syz-executor.3 05:51:45 executing program 1: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:45 executing program 4: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='minix\x00', 0x0, 0x0) 05:51:45 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:45 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:45 executing program 4: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='minix\x00', 0x0, 0x0) [ 200.575319] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 200.588279] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) 05:51:46 executing program 1: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x80000000, 0x4}) 05:51:46 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 200.650531] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pig=16712 comm=syz-executor.3 05:51:46 executing program 4: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='minix\x00', 0x0, 0x0) 05:51:46 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) 05:51:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) [ 200.785923] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:46 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:46 executing program 4: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) 05:51:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) [ 200.831765] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) 05:51:46 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) [ 200.929395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pig=16749 comm=syz-executor.3 05:51:46 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) 05:51:46 executing program 4: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) 05:51:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:46 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) [ 201.099455] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:46 executing program 4: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) 05:51:46 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 201.143154] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 201.148871] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pig=16774 comm=syz-executor.3 05:51:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:46 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) 05:51:46 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:46 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003, 0x0, 0x4}) 05:51:46 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:46 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000100)) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:46 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) [ 201.391636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pig=16806 comm=syz-executor.3 05:51:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003}) 05:51:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:46 executing program 0: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 201.509281] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:46 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:51:46 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:46 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) [ 201.609665] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pig=16832 comm=syz-executor.3 05:51:47 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:47 executing program 4: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000040)) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 05:51:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:47 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:47 executing program 4: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:47 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 201.793653] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:47 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:51:47 executing program 4: ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) [ 201.988337] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:47 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:47 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) [ 202.035711] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:51:47 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) [ 202.086561] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:47 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:47 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, 0x0, 0x0) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:51:47 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:47 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, 0x0, 0x0) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:47 executing program 4: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:47 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) [ 202.357840] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:47 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:47 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 202.418566] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) socket(0xa, 0x1, 0x0) r3 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000040)) 05:51:47 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:47 executing program 4: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, 0x0, 0x0) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:47 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) 05:51:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000020319000000070000000681", 0x10}], 0x1) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r1, r0) 05:51:48 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0), 0x0) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:48 executing program 4: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:48 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) 05:51:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x100000001) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r5, 0x800fe) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000100)=0xc4, 0x4) ioctl$VIDIOC_G_JPEGCOMP(r5, 0x808c563d, &(0x7f0000000040)) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r4, r7, 0x0, 0x8000fffffffe) r8 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x9, 0x0) sendfile(r6, r8, &(0x7f00000001c0), 0x52) ioctl$KVM_SET_SIGNAL_MASK(r4, 0x4004ae8b, &(0x7f0000000000)={0x2, '\n&'}) 05:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0), 0x0) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) socket$inet(0x2, 0x4, 0x4) r3 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000040)) 05:51:48 executing program 4: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000240)={0x0, 0x80000000, 0x4}) 05:51:48 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0), 0x0) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:48 executing program 5 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:48 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:48 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) [ 202.951350] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{0x0}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:48 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003}) [ 203.051116] FAULT_INJECTION: forcing a failure. [ 203.051116] name failslab, interval 1, probability 0, space 0, times 0 05:51:48 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 203.117210] CPU: 0 PID: 17000 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 203.124281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.133649] Call Trace: [ 203.136254] dump_stack+0x138/0x197 [ 203.139901] should_fail.cold+0x10f/0x159 [ 203.144065] should_failslab+0xdb/0x130 [ 203.148057] __kmalloc_track_caller+0x2ec/0x790 [ 203.152743] ? __sb_end_write+0xc1/0x100 [ 203.156814] ? strndup_user+0x62/0xf0 [ 203.160628] memdup_user+0x26/0xa0 [ 203.164172] strndup_user+0x62/0xf0 [ 203.167908] SyS_mount+0x3c/0x120 [ 203.171387] ? copy_mnt_ns+0x8c0/0x8c0 [ 203.175258] do_syscall_64+0x1e8/0x640 [ 203.179131] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.183962] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.189132] RIP: 0033:0x459f49 [ 203.192301] RSP: 002b:00007f7361854c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 203.199999] RAX: ffffffffffffffda RBX: 00007f7361854c90 RCX: 0000000000459f49 [ 203.207271] RDX: 0000000020000500 RSI: 0000000020000480 RDI: 0000000000000000 05:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{0x0}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:48 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) 05:51:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000180)={0x0, 0x10001}) r3 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000040)) [ 203.215152] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.222404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73618556d4 [ 203.229655] R13: 00000000004c69b2 R14: 00000000004dbe18 R15: 0000000000000004 05:51:48 executing program 5 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{0x0}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) 05:51:48 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) 05:51:48 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 203.435591] FAULT_INJECTION: forcing a failure. [ 203.435591] name failslab, interval 1, probability 0, space 0, times 0 [ 203.471116] CPU: 0 PID: 17028 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 203.478178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.478186] Call Trace: [ 203.478205] dump_stack+0x138/0x197 [ 203.478228] should_fail.cold+0x10f/0x159 [ 203.493831] should_failslab+0xdb/0x130 [ 203.493848] kmem_cache_alloc+0x2d7/0x780 [ 203.506187] ? find_held_lock+0x35/0x130 [ 203.510237] ? __might_fault+0x110/0x1d0 [ 203.514287] getname_flags+0xcb/0x580 [ 203.518071] ? __might_fault+0x110/0x1d0 [ 203.522114] user_path_at_empty+0x2f/0x50 [ 203.526248] do_mount+0x12b/0x27d0 [ 203.529778] ? copy_mount_string+0x40/0x40 [ 203.533994] ? _copy_from_user+0x99/0x110 [ 203.538127] ? memdup_user+0x58/0xa0 [ 203.541829] ? copy_mount_options+0x1fe/0x2f0 [ 203.546306] SyS_mount+0xab/0x120 [ 203.549738] ? copy_mnt_ns+0x8c0/0x8c0 [ 203.553610] do_syscall_64+0x1e8/0x640 [ 203.557481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.562312] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.567496] RIP: 0033:0x459f49 [ 203.570665] RSP: 002b:00007f7361854c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 203.578356] RAX: ffffffffffffffda RBX: 00007f7361854c90 RCX: 0000000000459f49 05:51:48 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x0, 0x4}) 05:51:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:49 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5400000038d5148b61e2c25848f6cce18923d6e06827bcac9ca4e1b834c32f02253a3f5e472fd04d1f", @ANYRES16, @ANYBLOB="000828bd7000fedbdf2506000000180007000c000300070000000000000008000100bb31000028000100100001007564703a73797a31000000001400020008000400017b00000800020006000000"], 0x54}, 0x1, 0x0, 0x0, 0x2004c840}, 0x884) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000480)={0x88, 0x0, 0x5fb228b11045e326, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x225}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x933e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x40000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x402400, 0x0) r3 = socket(0x11, 0x2, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, &(0x7f00000000c0)=0x20) r6 = syz_open_dev$swradio(&(0x7f0000000580)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000006c0)={r5, 0x81}, &(0x7f0000000700)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000740)={r7, 0x7e, 0x9}, &(0x7f00000017c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={r5, @in={{0x2, 0x4e21, @loopback}}, [0x6, 0x5, 0x8, 0x5, 0x40, 0x200, 0x80, 0x8, 0x7fffffff, 0x5, 0x9, 0x74, 0x8, 0x3f, 0x8000]}, &(0x7f0000000180)=0x100) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r8, 0x4}, 0x8) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000240)={0x8001003}) [ 203.585608] RDX: 0000000020000500 RSI: 0000000020000480 RDI: 0000000000000000 [ 203.592860] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.600120] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73618556d4 [ 203.607372] R13: 00000000004c69b2 R14: 00000000004dbe18 R15: 0000000000000004 05:51:49 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)) 05:51:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) 05:51:49 executing program 5 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:49 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:49 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)) 05:51:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:49 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x48083, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) [ 203.859163] FAULT_INJECTION: forcing a failure. [ 203.859163] name failslab, interval 1, probability 0, space 0, times 0 [ 203.902793] CPU: 1 PID: 17066 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 203.909867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.919232] Call Trace: [ 203.921837] dump_stack+0x138/0x197 [ 203.925626] should_fail.cold+0x10f/0x159 [ 203.929804] should_failslab+0xdb/0x130 [ 203.933790] kmem_cache_alloc+0x2d7/0x780 [ 203.937961] ? lock_downgrade+0x740/0x740 [ 203.942136] alloc_vfsmnt+0x28/0x7d0 [ 203.945856] vfs_kern_mount.part.0+0x2a/0x3d0 05:51:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900", 0x8}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:49 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0) [ 203.950360] do_mount+0x417/0x27d0 [ 203.953923] ? copy_mount_string+0x40/0x40 [ 203.958165] ? memdup_user+0x58/0xa0 [ 203.961892] ? copy_mount_options+0x1fe/0x2f0 [ 203.966398] SyS_mount+0xab/0x120 [ 203.969858] ? copy_mnt_ns+0x8c0/0x8c0 [ 203.973835] do_syscall_64+0x1e8/0x640 [ 203.977738] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.982961] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.988159] RIP: 0033:0x459f49 [ 203.991342] RSP: 002b:00007f7361854c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:51:49 executing program 5 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) [ 203.991353] RAX: ffffffffffffffda RBX: 00007f7361854c90 RCX: 0000000000459f49 [ 203.991358] RDX: 0000000020000500 RSI: 0000000020000480 RDI: 0000000000000000 [ 203.991362] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.991367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73618556d4 [ 203.991371] R13: 00000000004c69b2 R14: 00000000004dbe18 R15: 0000000000000004 [ 204.096999] FAULT_INJECTION: forcing a failure. [ 204.096999] name failslab, interval 1, probability 0, space 0, times 0 [ 204.157624] CPU: 1 PID: 17081 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 204.164784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.174399] Call Trace: [ 204.176982] dump_stack+0x138/0x197 [ 204.180605] should_fail.cold+0x10f/0x159 [ 204.184759] should_failslab+0xdb/0x130 [ 204.188733] kmem_cache_alloc_trace+0x2e9/0x790 [ 204.193780] ? lock_downgrade+0x740/0x740 [ 204.197947] kernfs_mount_ns+0x67/0x790 [ 204.202115] sysfs_mount+0xaa/0x170 [ 204.205734] ? sysfs_kill_sb+0x40/0x40 [ 204.210325] mount_fs+0x97/0x2a1 [ 204.213697] vfs_kern_mount.part.0+0x5e/0x3d0 [ 204.218191] do_mount+0x417/0x27d0 [ 204.222340] ? copy_mount_string+0x40/0x40 [ 204.226658] ? memdup_user+0x58/0xa0 [ 204.230619] ? copy_mount_options+0x1fe/0x2f0 [ 204.235098] SyS_mount+0xab/0x120 [ 204.238548] ? copy_mnt_ns+0x8c0/0x8c0 [ 204.242421] do_syscall_64+0x1e8/0x640 [ 204.246402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.251235] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 204.256410] RIP: 0033:0x459f49 [ 204.260799] RSP: 002b:00007f7361854c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 204.269026] RAX: ffffffffffffffda RBX: 00007f7361854c90 RCX: 0000000000459f49 [ 204.276278] RDX: 0000000020000500 RSI: 0000000020000480 RDI: 0000000000000000 [ 204.283531] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 204.291073] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73618556d4 [ 204.298329] R13: 00000000004c69b2 R14: 00000000004dbe18 R15: 0000000000000004 05:51:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 05:51:49 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0) 05:51:49 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x0, 0x3}) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x521180) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000080)={0x4, 0x5}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000040)) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) msgget$private(0x0, 0x236) r6 = socket(0x11, 0x2, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, &(0x7f00000000c0)=0x20) r9 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r9, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r10 = socket(0x11, 0x2, 0x0) close(r10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r10, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r9, 0x84, 0x70, &(0x7f0000000100)={r11, @in={{0x2, 0x4e23, @empty}}, [0x7, 0xb1f, 0x8001, 0x40, 0x4, 0x7e90, 0xfff, 0x9, 0x1, 0xfffffffffffff000, 0x40, 0x4, 0xffffffffffffa2cd, 0x0, 0x4f6d]}, &(0x7f0000000200)=0x100) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000280)={r8, 0x10000, 0x7, 0x9, 0x19e3, 0x5, 0x9, 0x5, {r12, @in6={{0xa, 0x4e22, 0x7, @rand_addr="0f7ef2b752d42d3a4a6cffc60a259b45", 0x3}}, 0x81, 0x1, 0x8000, 0x6, 0x7}}, &(0x7f0000000340)=0xb0) sendfile(r3, r5, 0x0, 0x8000fffffffe) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) 05:51:49 executing program 5 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:49 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e22, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x2, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003}) [ 204.594203] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 204.616814] FAULT_INJECTION: forcing a failure. [ 204.616814] name failslab, interval 1, probability 0, space 0, times 0 05:51:50 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0) [ 204.636886] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 204.641049] CPU: 0 PID: 17103 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 204.653582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.660481] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 204.662941] Call Trace: [ 204.662961] dump_stack+0x138/0x197 [ 204.662989] should_fail.cold+0x10f/0x159 [ 204.683023] should_failslab+0xdb/0x130 [ 204.686991] kmem_cache_alloc_trace+0x2e9/0x790 [ 204.691834] ? lock_downgrade+0x740/0x740 [ 204.695971] kernfs_mount_ns+0x67/0x790 [ 204.699985] sysfs_mount+0xaa/0x170 [ 204.703600] ? sysfs_kill_sb+0x40/0x40 [ 204.707478] mount_fs+0x97/0x2a1 [ 204.710845] vfs_kern_mount.part.0+0x5e/0x3d0 [ 204.715338] do_mount+0x417/0x27d0 [ 204.718882] ? copy_mount_string+0x40/0x40 [ 204.723116] ? memdup_user+0x58/0xa0 [ 204.726810] ? copy_mount_options+0x1fe/0x2f0 [ 204.731288] SyS_mount+0xab/0x120 [ 204.734723] ? copy_mnt_ns+0x8c0/0x8c0 [ 204.738610] do_syscall_64+0x1e8/0x640 [ 204.742488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.747322] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 204.752493] RIP: 0033:0x459f49 [ 204.755667] RSP: 002b:00007f7361854c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 204.764246] RAX: ffffffffffffffda RBX: 00007f7361854c90 RCX: 0000000000459f49 [ 204.771498] RDX: 0000000020000500 RSI: 0000000020000480 RDI: 0000000000000000 [ 204.778763] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 204.786811] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73618556d4 05:51:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:50 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xa1, 0x7094c0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) write$P9_RXATTRCREATE(r3, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r6 = accept4$vsock_stream(r5, &(0x7f0000002b00)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80000) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) sendmmsg$sock(r7, &(0x7f0000004680)=[{{&(0x7f00000001c0)=@llc={0x1a, 0x30f, 0x5, 0x2, 0x9, 0x5, @local}, 0x80, &(0x7f0000002700)=[{&(0x7f0000002280)="530dadbc6a0835dc5ed576ebae54b6d6ef964f7708d28f953e3c20c4f72f46980edbe88701652a42b14ac7fb76562e77d70116860977f7b24ed710830c1c788b0d21888619d4d3f7484e1fbc371adcc6ac565b498852cb0f59da5de445811e64cd985704cd429fc0c07882eb6ac2720d4215522f1aa302a06ac55db831c1f4796c086d93dbd62aa92d7778ad289001d1334e22a173dd995376e2f9314e85a34365018a4a28685c476a33ff2ddd86e89ff94beae5ae04000e0d83f4ef6160c80c8df1838f33c659b367e6d331ba963e141297ffeb14a2b5d889b77230dfcbaa6bbf6c45519ca80aee961e4e0c74e07c", 0xef}, {&(0x7f0000002380)="d1fcbde1c21c6b9883674bfbba03be190c6868e52769574a485cbc014e8abaecfdec204b49d743b7949d899a30d5b1a75cc95096999e4c2112e11613adf0fb4b2d86b30596ce13b58421a42ba28aa07650dd186946858b048a348c1a934a3d3bdd16b1be24012173faa51160f23a7762cc58518a499acc97f127ba32fd137fd68992662a803618761735ab049eea60ff360e6c0e5edcd168226561c46f5ea116fb09f934f1d567f63991a41d6e5b238f0b491d0c6119f6330e4d12283752fe26c9213016aa583c19ac2127eee8", 0xcd}, {&(0x7f0000002480)="78c0b67a6065d5304fa868bbf70ff1a5c85e6cf2a566755d21fb403cff932ef1be3e36e424263b12732ee1b9a4c50049a51a462856685e81a01769e81fc142e7422717c78572ee728009102d61754ec3291e027b61b5997f80b5912acc9a5061dec980b649bec347964e5f2f3e96af1a1e9a38258301dd03187905f1e7cd0b57dca515dfe08324c854ddfa2b0b8036cbe78e9bb649b6c4db43175b0009e757eaf7471fe69b82d6985ea9f9c736e2d0c7dad42be11f88d6ec5ce95700ca0cef685d8af7906d3180df728e8cda7c76ec76853f8663c0acb4e1ec2f82", 0xdb}, {&(0x7f0000002580)="802a9c15decc2c3a2386b371ab81e41ab27fd9939be81cbbf3541853cf318d04ea562a9664d0d66ad0bf0517e399fb2aa6df0a9263b91acb2b33e881695d3464185e38a335969bd2ddee0a498c420d33e25192321bd0379b093444c2b485fc09c68a93ce82a370c19b5daf7e9d5187190c2cccf12b18d592f6e262e1", 0x7c}, {&(0x7f0000002600)="ee66d1535de55b2fc89b6cb03a4bd03fdf32504cf36b358fd2753578761a0a9bfe02f46cbb4343141a1f2c108c5a8157f89bdd549987d7fb4c1c", 0x3a}, {&(0x7f0000002640)="d9b42fca9943334f73c320a0000c380018a98ac3d355d7179368bedf396a35e843299ce88a2c912a6bc47f6caae8ce72fc04f0c5571def118f8e5f81e7050117b92f651ced3c549da9cce94cb03e15794915248db75d404ed302cd4dad1e2bc4d29dbb5c7d7ed72b1ee582e853e57cd286cc450cda73e891c1e406eee0e7f5b01c82835c29dcee77a0c196ec344d994946d9bbd67a136831d8276b02c9177f", 0x9f}], 0x6, &(0x7f0000002780)=[@mark={{0x14, 0x1, 0x24, 0x6637}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0xa72}}], 0x48}}, {{&(0x7f0000002800)=@ax25={{0x3, @null, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000002a00)=[{&(0x7f0000002880)="bf4f8ac1a525bd68f1764b646ed0f18e83d7905bcae5e963592fbecf9b47a70fb2e399ab739bc04379757a4299dfde04", 0x30}, {&(0x7f00000028c0)="4aeabf9cb23fcc3a2a7d8dc3", 0xc}, {&(0x7f0000002900)="d578b91f80c2ca2ae544db25b21e57cedc278126d0b9951782c04c02a8c6ca50eec65d70c262d364e4d2fc1d34c304f1701184493be2fc42c5af9ce8d4cbf054f283ad27f356717952fc7b78afa460356f84a4e50cc8258b09808b245753030c3e6d59d4afced3d250d9357538fee0212f1687ce5275818b98f870d2af1c74db616e4acd207d1b2395563b00162946fe04618f897c892a304b1550b09c8137985a38dc82e76b528877f0c2525a261093ba97cc6cdf60626f68b088f4ff17503d8658a9deaac8f528d1c600", 0xcb}], 0x3, &(0x7f0000002a40)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x1c00}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @txtime={{0x18, 0x1, 0x3d, 0x8000}}, @txtime={{0x18, 0x1, 0x3d, 0x2000000000000007}}, @timestamping={{0x14, 0x1, 0x25, 0x3ff}}, @mark={{0x14, 0x1, 0x24, 0xff}}], 0xc0}}, {{&(0x7f0000002b40)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e21, @multicast1}, 0x3, 0x1}}, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002bc0)="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", 0xfa}, {&(0x7f0000002cc0)="463bc74a", 0x4}, {&(0x7f0000002d00)="869d424070507c2b082afa560b0e57b774b97656fd6dc90c1e07f242d5247bb12f571490e7d72ecbd52933c1220540faad68ec08a22b1802a266e7a576bf6eccef74a5c2c3838d1920d19ba9f2e31169", 0x50}, {&(0x7f0000002d80)="48d4faed15c35b7197dfbd95831f9e0107d5c2709b89aa", 0x17}], 0x4, &(0x7f0000002e00)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x30}}, {{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002e40)="a413033a958526f6a664f4872bd17c23be6facff880c4b750eb74e135bd5723045668e62849138260ebb055cbe85e2f69cdff4e0e89d4f63fb895c348d618b36761729c353b8c94b5ec6a9db4d2bc4f613288dd8c521c1fd43a53461a0a10031129bde091e282e548cbaed994c5168fa947eb4eae323feacbb949c942445add382baf3754d64cdaf359f6e8df223b74ba9b5864d07d5e1ce32b7", 0x9a}, {&(0x7f0000002f00)="b09512de2cd228c56751deff0e536dcffe075aa047bc1a08", 0x18}], 0x2}}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000002f80)="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", 0xfc}, {&(0x7f0000003080)}, {&(0x7f00000030c0)="2d04d6e715e412fc93432e67ccd8ce89c720dfedcfac328c6eebac23aac3b210c0b6793193903686f22a93cfc48bf762d79b55486457d50a67f5d012726bb5f542a9c69292ffe9015ac7319c8f42374d6752610abfbeb05cb9f203f20826143d6efb0707a570699e5bff739d84587965ecb79d2eb998dc6bb0c7df4ed5af9b7d84b71e396662b0c2fe22765e85", 0x8d}, {&(0x7f0000003180)="e2754a2070b1fb3f8e71a24fcba481dbb84515ccf6042497ab947f6f3b65b7645fa88ddd4ecf9d7b8ccbbeaad6eed01c53795b07a6ea3599092b5b657a253812395e43178f77aa264ceaf8c6d03be5d8e797953994f825853a175e843c619227af8758eda288aef82116ec3cb9e67a278c036f4c13ba49e0633d6ca1684c626287c1838ad1f90711a84fd8cbfbf01e7b5c4adbd3631d10003ca38b1bb1", 0x9d}, {&(0x7f0000003240)="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", 0x1000}, {&(0x7f0000004240)="b4ac0e8488739ef5ace0e448974c410ce36d909b88eac789df3d7c8ebd9795bcb40fb6f14efd95884ac8244698f9303ef586055212d95685b1e79d32d37e0ba67e60ca3688d7fa83ce68f477be70d60c25bf302b1a", 0x55}], 0x6, &(0x7f0000004340)=[@txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0xf0e1}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}], 0x90}}, {{0x0, 0x0, &(0x7f0000004600)=[{&(0x7f0000004400)="fc6c834434c7a088a868fc39bf3d81199c039180336aabcd2a0d04db2b2cdfa51f", 0x21}, {&(0x7f0000004440)="7579cf31b1f3eb8cc7ff39e66eccbfbf02b1c931461bd36541e16e6323ce30b708ba2735a932c5b678ae73ac01902f0e8020812ed51e7e74e10534d9e05ab7fd8f35e0f60e85a271217d1d913d40dfff0b6489ee61d127d8012e7b1e8dd5ae796ff59b391ad6a8585e4696c5f7286b2503718d71c7f2f658f3f4953d6a15cfb9d32d6ec2b7d397fecd1208557caaf4343672a060bd78ee99c3fe85a6418e7f1b461483f560f0def5b1fb0e96ba33e1ab127a97ca25129fb9164f6f1b31906f9a704fe257487b7bf214557dc28b9ec78df2e5e82aed8f9319c874596083fab0019f5e2a3c", 0xe4}, {&(0x7f0000004540)="2e6e468344effb6e8dcd68e8f9ddfe9f1e0df34b5b2607427ec4e9e4a3f29d0086b71afb8b1e18e9a20349e844342c42a22263c7e3efe13e32a9790aa80168e0496a91c83fb8e1d27801bf4a8a3ce29233473e1828dd1395f4f1e2f79643a59b47f7a4ea42727dd1fcd3998d89cc7f0056bac4c075ef09c88434ed3843305c0fc32effcf2e4d67cbb68867dd004b7be4564d2a9208db01efe9ec83c1c55d20018d0af5513eb4bdd2873d959961b3a8af48ccbb6526eb62ec", 0xb8}], 0x3, &(0x7f0000004640)=[@txtime={{0x18, 0x1, 0x3d, 0xe5ab}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffff8}}], 0x30}}], 0x6, 0x20040000) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f0000000240)={0x8001003}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80100, 0x0) 05:51:50 executing program 2: r0 = socket(0x0, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) [ 204.794066] R13: 00000000004c69b2 R14: 00000000004dbe18 R15: 0000000000000004 05:51:50 executing program 5 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) [ 204.868729] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 204.904614] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:50 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:50 executing program 2: r0 = socket(0x0, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) [ 204.924966] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:50 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x280000) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1c) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000240)={0x8001003}) [ 204.966148] FAULT_INJECTION: forcing a failure. [ 204.966148] name failslab, interval 1, probability 0, space 0, times 0 [ 204.977947] CPU: 0 PID: 17124 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 204.985085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.994438] Call Trace: [ 204.997064] dump_stack+0x138/0x197 [ 205.000686] should_fail.cold+0x10f/0x159 [ 205.004823] should_failslab+0xdb/0x130 [ 205.008792] kmem_cache_alloc_trace+0x2e9/0x790 [ 205.013460] ? lock_downgrade+0x740/0x740 [ 205.017598] sget_userns+0xfe/0xc30 [ 205.021208] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 205.025858] ? kernfs_sop_show_options+0x190/0x190 [ 205.030791] kernfs_mount_ns+0xe9/0x790 [ 205.034758] sysfs_mount+0xaa/0x170 [ 205.038380] ? sysfs_kill_sb+0x40/0x40 [ 205.042253] mount_fs+0x97/0x2a1 [ 205.045616] vfs_kern_mount.part.0+0x5e/0x3d0 [ 205.050114] do_mount+0x417/0x27d0 [ 205.053641] ? copy_mount_string+0x40/0x40 [ 205.057895] ? memdup_user+0x58/0xa0 [ 205.062720] ? copy_mount_options+0x1fe/0x2f0 [ 205.067214] SyS_mount+0xab/0x120 [ 205.070659] ? copy_mnt_ns+0x8c0/0x8c0 [ 205.074540] do_syscall_64+0x1e8/0x640 [ 205.078421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.083259] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.088443] RIP: 0033:0x459f49 [ 205.091619] RSP: 002b:00007f7361854c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 205.100011] RAX: ffffffffffffffda RBX: 00007f7361854c90 RCX: 0000000000459f49 [ 205.107285] RDX: 0000000020000500 RSI: 0000000020000480 RDI: 0000000000000000 [ 205.114541] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 205.121792] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73618556d4 [ 205.129665] R13: 00000000004c69b2 R14: 00000000004dbe18 R15: 0000000000000004 [ 205.381917] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 205.393740] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:50 executing program 0 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:50 executing program 5 (fault-call:3 fault-nth:6): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f000000", 0x4}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:50 executing program 2: r0 = socket(0x0, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 05:51:50 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x17) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r4, 0x0, 0x0) write$P9_RGETLOCK(r3, &(0x7f0000000040)={0x2c, 0x37, 0x2, {0x3, 0x9, 0x100, r4, 0xe, '/dev/swradio#\x00'}}, 0x2c) 05:51:50 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003}) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x0, 0x3) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x8000, 0x2e4, &(0x7f0000000300)="6719f5c6c7a7a8c5aeea0d80dfcea4ccadee5e7afe1bbad4dd0713cbc6c51e3cb98f7d6c54ac98e818222cc4a03a8e2ec5cc4c94c5ae0cfa7202ea84140481eec0b3b7fbb15aafce", &(0x7f0000000380)="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", 0x48, 0x172}) r2 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000002c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x7, 0x0, 0x0, 0x1, 0x0, 0x68, 0x0, 0x1e, 0x3}]}, {0x0, [0x61, 0x0, 0x0]}}, &(0x7f0000000140)=""/238, 0x2d, 0xee, 0x1}, 0x20) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000540)={0x1, 0x100, 0x4}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000080)={r0, r5, 0x8}) 05:51:50 executing program 2: r0 = socket(0xa, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) [ 205.481905] FAULT_INJECTION: forcing a failure. [ 205.481905] name failslab, interval 1, probability 0, space 0, times 0 [ 205.485559] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 205.515599] FAULT_INJECTION: forcing a failure. [ 205.515599] name failslab, interval 1, probability 0, space 0, times 0 [ 205.524489] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 205.534909] CPU: 0 PID: 17154 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 205.544200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.553562] Call Trace: [ 205.556159] dump_stack+0x138/0x197 [ 205.559785] should_fail.cold+0x10f/0x159 [ 205.563955] should_failslab+0xdb/0x130 [ 205.567929] kmem_cache_alloc+0x2d7/0x780 [ 205.572074] ? lock_downgrade+0x740/0x740 [ 205.576220] getname_flags+0xcb/0x580 [ 205.580800] ? check_preemption_disabled+0x3c/0x250 [ 205.585814] user_path_at_empty+0x2f/0x50 [ 205.589956] path_setxattr+0x89/0x140 [ 205.593750] ? setxattr+0x350/0x350 [ 205.597375] ? SyS_write+0x15e/0x230 [ 205.601084] SyS_lsetxattr+0x38/0x50 [ 205.605306] ? SyS_setxattr+0x50/0x50 [ 205.609124] do_syscall_64+0x1e8/0x640 [ 205.613006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.617932] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.623113] RIP: 0033:0x459f49 05:51:51 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003}) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="10002bbd7000fedbdf25030000003c000900080002003f0000000800010000000000080002000700000008000200ff0f00000800010009000000080001000100000008000200ff0700002c00090008000200930000000810020005000000080002000200000008000100090000000800010031000000"], 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) 05:51:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) [ 205.626296] RSP: 002b:00007fec9efa5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 205.633999] RAX: ffffffffffffffda RBX: 00007fec9efa5c90 RCX: 0000000000459f49 [ 205.641261] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 205.648523] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 205.655781] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec9efa66d4 [ 205.663040] R13: 00000000004cf6c0 R14: 00000000004dbb00 R15: 0000000000000003 [ 205.687374] CPU: 1 PID: 17161 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 205.694414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.694457] Call Trace: [ 205.694471] dump_stack+0x138/0x197 [ 205.694487] should_fail.cold+0x10f/0x159 [ 205.694507] should_failslab+0xdb/0x130 [ 205.694520] __kmalloc+0x2f0/0x7a0 [ 205.721974] ? __list_lru_init+0x6b/0x660 [ 205.726135] __list_lru_init+0x6b/0x660 [ 205.730124] sget_userns+0x4e0/0xc30 05:51:51 executing program 0 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) [ 205.733848] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 205.738525] ? kernfs_sop_show_options+0x190/0x190 [ 205.743514] kernfs_mount_ns+0xe9/0x790 [ 205.748008] sysfs_mount+0xaa/0x170 [ 205.748019] ? sysfs_kill_sb+0x40/0x40 [ 205.748035] mount_fs+0x97/0x2a1 [ 205.748051] vfs_kern_mount.part.0+0x5e/0x3d0 [ 205.748063] do_mount+0x417/0x27d0 [ 205.763425] ? copy_mount_string+0x40/0x40 [ 205.763440] ? memdup_user+0x58/0xa0 [ 205.763451] ? copy_mount_options+0x1fe/0x2f0 [ 205.763466] SyS_mount+0xab/0x120 [ 205.771215] ? copy_mnt_ns+0x8c0/0x8c0 [ 205.771231] do_syscall_64+0x1e8/0x640 [ 205.771241] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.771256] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.771264] RIP: 0033:0x459f49 [ 205.771268] RSP: 002b:00007f7361854c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 205.771278] RAX: ffffffffffffffda RBX: 00007f7361854c90 RCX: 0000000000459f49 [ 205.771284] RDX: 0000000020000500 RSI: 0000000020000480 RDI: 0000000000000000 [ 205.771290] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:51:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) 05:51:51 executing program 5 (fault-call:3 fault-nth:7): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) 05:51:51 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffffffa, 0x212080) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1, 0x1) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r4, 0x6}, 0x8) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000240)) 05:51:51 executing program 2: r0 = socket(0xa, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) [ 205.771296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73618556d4 [ 205.771301] R13: 00000000004c69b2 R14: 00000000004dbe18 R15: 0000000000000004 [ 205.787770] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 205.957911] FAULT_INJECTION: forcing a failure. [ 205.957911] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 205.965673] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 205.969830] CPU: 0 PID: 17195 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 205.969839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.969843] Call Trace: [ 205.969863] dump_stack+0x138/0x197 [ 205.993796] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 205.996287] should_fail.cold+0x10f/0x159 [ 205.996303] __alloc_pages_nodemask+0x1d6/0x7a0 [ 206.021006] ? fs_reclaim_acquire+0x20/0x20 [ 206.025855] ? __alloc_pages_slowpath+0x2930/0x2930 [ 206.030905] cache_grow_begin+0x80/0x400 [ 206.034960] kmem_cache_alloc+0x6a6/0x780 [ 206.039112] ? lock_downgrade+0x740/0x740 [ 206.043529] getname_flags+0xcb/0x580 [ 206.047323] ? check_preemption_disabled+0x3c/0x250 [ 206.052326] user_path_at_empty+0x2f/0x50 [ 206.056462] path_setxattr+0x89/0x140 [ 206.060260] ? setxattr+0x350/0x350 [ 206.063884] ? SyS_write+0x15e/0x230 [ 206.067594] SyS_lsetxattr+0x38/0x50 [ 206.071291] ? SyS_setxattr+0x50/0x50 [ 206.075078] do_syscall_64+0x1e8/0x640 [ 206.078950] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.083791] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.088972] RIP: 0033:0x459f49 [ 206.092144] RSP: 002b:00007fec9efa5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd 05:51:51 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000080)={0x4}) 05:51:51 executing program 2: r0 = socket(0xa, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 05:51:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00", 0x2}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) [ 206.099834] RAX: ffffffffffffffda RBX: 00007fec9efa5c90 RCX: 0000000000459f49 [ 206.115945] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 206.123234] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 206.130498] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec9efa66d4 [ 206.137884] R13: 00000000004cf6c0 R14: 00000000004dbb00 R15: 0000000000000003 05:51:51 executing program 0 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 206.166193] FAULT_INJECTION: forcing a failure. [ 206.166193] name failslab, interval 1, probability 0, space 0, times 0 [ 206.187350] CPU: 0 PID: 17200 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 206.195003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.204355] Call Trace: [ 206.204374] dump_stack+0x138/0x197 [ 206.204392] should_fail.cold+0x10f/0x159 05:51:51 executing program 4: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) clone(0x10808800, &(0x7f0000000040)="10fa9400b3791093e1841cfd46aadb7f2ee651a8c2e1c2cf870d99cae374ea1b035710bb6bf3528fc00ece6bc7040609a3c080e031fe61f0756103527486d3888d780ad15f571d0cd984f4c479e4d149316caced19b35b406afe508bafb105ac3f0588e2bab52a8a949695d3e3aa23f1a3f987e196844a32f227", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="383e52420d0bafe739587227ea3459ff4ae3e7e00f660780b7fc891053c05b84b3fd0d1b70228790943437a771c0a42535d14831b0ad1b70042a38f878f19cc414596bc112a343049fa26975ef3a018f54c15fc01c2a5bd241dfa4c353b506f0f0537065a8c2d5e50b4899f312c74a68b6f7b627af40636b0c7a8980bde79612be06c4dcc8606f34374da5c362b2b9936de53411b622ef42f6b70f594bf354cf81a7cfb1cb2d14d2f72fcde3d5726d3f3d0a192027b9b7919aacd8") setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000200)=0x0) r6 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r6) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x17) r8 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r8) ptrace$cont(0x20, r8, 0x9, 0x1002) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r7, 0x0, 0x0) r9 = gettid() r10 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @tid=r10}, 0x0) r11 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x80, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r11, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffd, 0x0, 0x2}, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r10, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r9, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='ppp0eth1]*em0\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001700)={r7, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000016c0)='security*\x00', r12}, 0x30) getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)=0x0) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r16}, {0x8, 0x0, r16}], {0x10, 0x6}}, 0x34, 0x0) r17 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r17) r18 = getegid() r19 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r19, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr=0x6, 0x0, 0x0, 'lblcr\x00', 0x27}, 0x2c) sendmsg$netlink(r19, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)={0x154, 0x13, 0x10, 0x70bd2d, 0x25dfdbfd, "", [@typed={0x8, 0x43, @u32=0x10000}, @nested={0x90, 0xf, [@generic="690ea1240d1237f721002e6f2735c142f205cc64dd9e5cdd75e3ad7abc362627d713bcb9788d", @generic="521fd6d99e56ccc3d485559ca69a70d3745f", @generic="e646664dad31bb3fe43533601970cd3501ddff6d27b54260fb4d9ce1794d58c5e19ffaa0d83ac83e6ceb266aa490c02cf75c42187b487b8a98a4817e4c5ea006759c7b85ef1bdf6b04137a4f80080f09e9"]}, @typed={0x8, 0x5e, @u32=0xd4cd}, @generic="1b10a3dafafd272239295a96570b34978811e4df61c837a0133ba769f4e204f30049beee32ae092ff66782ae3b7d62bc9f2563594477e159ba053e3fa4b75e01e7d478574973b03bf907819ee6b7fb1daa0f20f986d2f8c16608f38c95de934a94a280adae542ddd0c30be8e1e3402eb2c400a8c3f2c4cf72b3cc4cdc51d4d91f88cce132ac572db823347fa05eedd07c1f560a63423c484c6c551d6938c647bf5"]}, 0x154}, {&(0x7f0000000480)={0x1218, 0x37, 0x0, 0x70bd25, 0x25dfdbfd, "", [@nested={0x9c, 0x3e, [@typed={0x14, 0x2, @str='/dev/swradio#\x00'}, @typed={0x58, 0x2b, @binary="c63c8ad1e8e64b9c10be77796d405ddfbdd77aaab724d8d6443b343cd17e29c15d29550e07bade16930797286b2132c33a321de5f25efef3135500eb4602eadc3d9fb1326de0dd38f864985105a4c4b67b"}, @generic="b3b7f544b7da", @typed={0x14, 0x81, @ipv6=@ipv4={[], [], @local}}, @typed={0x8, 0x20, @pid=r5}, @typed={0x8, 0x43, @pid=r6}]}, @generic="26b7044e76cd07da19f033a51620a7d4a5e9b0ec27061196e772f503aa82199e0792341e665fb95610ca4aa99d51932667a89d88de7a6c6161014661553c0c878f3f16beaea4c182e5f9a1fd43375dfbb138adc719951eeb75cc0d5adda57c3fca75e8f0ba004370c765c0ef1f1b696ee5e4d0fb3331a4ed8215f1df876c14b0018cda4511dcd57a37f246778ea988826dad3103f5978b225b337c853351f93e50f3090e4f683a98a71761472ff143b2c292ae16908e14f7465967266506b258dadd78ca516f1b242cded27b93af5cda40d30a9b693f93418ae3b7d4b49ae9832cf5d8072a06633b63", @generic="3340cc6e2e35335758758df073a4c9d9c8bf4d8d764bb0040c471675f10f619849db4f0f0175aba24fa08abafdc55e1f28d481cf899064445f4ee8f6f798bf595bec5ab76403727c77654bc76eceb699cbb2f3046c9adbfe9ecf786a4f5adabd5a3436a025a1ccae993470a00a307dd124621b6a374b995d737d0175f257b713651902ca90ca9b8cd1186ec4701d7982aae14d5fb0ed283c6d0996c6ba90e42513b22276a0d07087475b5ce45dae5871b79e7d741939742c189632bf21ccbc7b461ee2637c3c65a5f4ce5ec401d9291560af9caea2dc1435de8824bfa0501805fa2b68f1c055a73ea2a049cb36c5775dbac37b521df14e80196a558f6fa026590b1618d29f398ffdfaf1c9199f3509845461cfefb155e6f40b722424456be29c6faa65adc6cac6b2e9444a04a7088897be15da69ff991226ce864bb863934f59c7ffd498d6183b8c36e79deec26b9cedfb4c3138129565222c23f9302c963c2976a15de75e28345ac9c118b28fce62e89d531d5c5829ef437ca10e8a913dd693f1cc36c053e837c1638414e9e8e85a61957fb7095cc5e802ec8a6f7f8ebbc616d43d07b5084d7507b6d96af7c701f239612039b2b6b68e1f2c09de42defeac9ba9149a2fadc7018ec23781a88b2e279a20c35dadd9642d20a5373e252ac2c84930c91e829373d848678276a7d591309f710edc697e9b9bb91b771b81bd7c3d06064346e9004ff44418a58cb0c2eb2659aa055469c6a847de65358a7031007c397598139181606c76821f696b7dac9148a22102408b3e951722046977e279831b461af01a3d0a347b6662c7d59b1b6804f4b082008dae1f66929a2201a78da1d02ec8bb606d45ecbe97ba136dd4f67005e8c32ed3320f2d41a2df360ac1f166acc4ed631ed203cc3ee3075b0b50ef5dff67729cbf51b72c96104c7b0b81a741b64ef0361c0dce4160673752de4d455491c8c742734fe34c14d62f44b952a1be4d6d97c05f53836528539daae8735bcfd1fdc47ed27a4724740cc4ad740042428cb3238dee7775f0fe3914fbaf43a344732a7e29ce6fbbaf4551fd493138b9b6445293847d39ee23e315785c792f15edf5a483b76022757c0cda4b64ad7d7e676d778d68d0a52b4e3badc4fa8b4a5a16dce91246b66d96954affa7de0abc96b28c740a12c395337d37b86ccf9f3d5ad63edfc26d0e0c8c8a4ee6bbf23676c174741a0c82223a1dab1a585bb3c236b012f632fdb76cb5543af730bcde59d8b792dfaf4e71f49df8c21685ede3dd124a8824c29e5762b8e42a9ac52fbfbf9e9f4924fe3c0b72d78d44637dae3b3e771e943c037f2949b172f16e8361687f748a6ecb3325afa19c833d15d5efe1d387b58a5ca08af4188942c6e2c961273b2649efc19d3385d2bab10888f820ad955d5aa3d80b6b2ceab36077dc89a893896a09b919b13233311ce5c2661fbbf511322af318648c463b34c80d4fecf3bb3a78dcb1960a3fb3642723033e435cf4f0dca4198830d53b4234d34cf372ece9244d13a447a60795d92a45defccd764eb49bec36239a5174905e30ec99aed3ed8d1c7b60dc8125ab6d5d00d0a3f3726bb4229c1b1f796e7549ca82fc104fe2cce5c3b3ea878e468f39cd21cbbd1799275c056a003400b28efc333310e41bee65c6579666ce3fb2b9956ced6090fd8c045bda07a43dd4813d9920f7f4d6fda0afe2cb18efc204bedf968f9e30882997ce3d75e48f578e61f9e1b0c9c5e0f50bf9a3c4ee614e4a03a9c71c5581aae9256c772b8349563439f3d68ae74718d5742b2f3c9e10f1c9428839b9f5c1df14dc86e1cfbf9b81e0f3a6821468f99995647547b3f07760b025eb99be99f061ec96dc2e9648adae5b89112dab4c980f02f1d0f4331e31cdabbec4b2b725d285086e9b2cc79286cfc5d0d60495da8b2ffa16a7866d523189b71ecead7f811301110a4d1da30a7005603985cee2d90caaee581fe933890993ade23f1b7419bea9d54a6e1640d990d39ad5fcfccf626bcb64f5a3e3f3b8f6753f1376232fb06ac850ea8ea2202dd44591acc1c521f73b464cefc37a1d4f7bbe4a57a377b6cb114d31b162e693dd0e21c0bc2b95ebc996604507f0a7f507c43fa5005697da72e04acdd8e90bed4d1224eda16662ac46f046d9a9e40b1774a848933fabca64ce4ac5c710b2a34dd1db1471f28c39abaa6344407c5bfb6b3e8acea790954206527ecf887737fcfd3d4d18eba53d75dc847bbac213d2037885094ae2e05bccdfb4d59130af862d4ed6f73d38d7a877132f025b2d9bf8063680ab3801f801f2ea5841abebef28d9b1616b9515fd5a02768dd000f5cc45c5f954a17a44149dadf2e6185006e248fb8d4c113a68e82473efc00c3195be6ebc29e42037db2faf2742ae5f3841b3aa3fd02adb90c6b3a4d5541c49189c3e78aa1d810a566a3d1a1ec5f19b2fb8b8a4e516396ff42cc0a06efab2dc6130fe96259a7d659d674ff6f8b6b686adfa6c64f612f53cc4f133fd89caea57fb39329f40a1541b51d6a636d34f0cd6eed3dd05bf12bbb27ccad1d8ccc258a4476576f27dbb3d94dfd251881bd7dc338cdc0fbad0e0fb951930a171450ccb3273db811afcea5f8c971c956c59ca5d2f65df2f8afd87c1dc3e84d5b7e6b326cdaa055cdfc3cc5fc8c080c111616cd40e1738b47dc7c5d2028c2ca77b165be4f1d60f6037dbca29c21bba0196189c67eebc96d2fbdb0da703fc03564149f98af61b41d7d67b1abf19bcf82c9bdc99c146159f31eb354eb0b3e608b1344401cedd594fe83a189201b392af95612456671d5b23e95b1cb48e866b8ff00bfcf8d29c8988d8a1d76f20cc1cd66cdc1587b85cb1ab9e14d6ff2a510072644cc65b2282eba39e5057ae086a7bd868572d3a34b3a8e6c7d5c06d7699adfe986b57cb8b5323dd9657230e8e7afcd46d498f97d3a5d6f9c75d865bca5f559cfde674e46d3d7894cdb6afd8a43a3a1986384cb8ed16ff4cc48d0849fd83793882f718a0bba4080fc43aa2722f0a707d30a01bb4fdeb94bbb7ff2d94a7733ab20cfabd0cd0194f9393afe80550a0aa1cc1ea8168d9b3794e475d35191741aec0f876729d1821b1d069d5736117f2e5dc5f2220fecf1b26cbc805255211fd5294a1a4af0b9b1d73b0973722b6fae8b5df09a41e9c4279c94977c2eb79fd97c88f0997d7b12767132869ae55705509cb7f2d9efee31123a36cd0d42f23805a3505fbdfcbd694e9f170195a3eba20622c30218c8f74ba5bc39f4dde20818a99312f7c3dab49844d50e65e71f34178cc04ea18b7314966bb0cdb817c6e5c7e82a7bd74dc43417435d6d58fedf703c068c7a492f69d2b6b1b37e4f8c3c8a514692c6e1610033710e84f32eb052f5c654f5a1f6e56472577a977e614844d5e24abd44156fc62745945500bae35bb6a2987468c3b28d2993f5cf65f4e6490e39a69d14b8e07f74d9a4c8efb69434894a5ae5d432d5240d0cc7d01e05b665c353d5576ba9345d547cb792183aa8bd1851bd17d13a50211831ab255272d5efcf4b887145c5a20ff038e19892981528d153b1952c92622333ea0e4fee52344bcfc74520d21c1769788d92c657b434cefee3d3d5362a0d7798d1ca988225c4fa9ef6e066ade64658d5e5214aaacda657022341c49c690a0941367e07139427a2581c8e35bf5f615af03e5f043e57c59eb8e299a5913998a64fb9e26e174ea66ec2254c1da2cf15851bfad57bed6345072d110904194c5434b37ebb8ce1607ac73a5f6134df28bc621d3799a860e3d3793dbd82180428ae693361a303e1868349185ca7e234473af0d40d6b7f1c315fd3c351dd5825784dbbfe4639a995389718d45171ee7e03b45f2fb75d58dc61afdd98b3fadd3a65aaffad3336035d882d72078f856848a0d620fe19d6946e9d716644c9563a4d647dc89d8b60867d086b66ca456e9da4b3f98bf4c6052b568bb97a5d3ee592e6d44e17466a400f72d80699f00eb8fd2f4074fe215aa8f5a1f597e06a4d823e674828302d0d71b5d226fc5de6eb9fdab535e6852bb7b7b08dae898eb7b8b94638893f4f9c127895c14b9ab7d6ce95ea055f36460f9e48f97fbcf28210c8581f1fcb880cc0b1a70f70cb455d2fc6b41c0bed1718dcf853b9f2d87fbeeeb71fafd66a9bc0f878e8575088aac94115e7fdef41ece28086bf005ce05603851ed9122b53a10da785b0e9cea87dea2519e494399688712d0ccb2cc8558b8cef295723e5636836b69a5ecbba14a685bfd3713ee29a2bd235418846be30e3d4149ff3fe2bfb2e0fc4e3e93c8944d68fafeb666ae32dd3e2923254403d013ce4a1153b42d079d80698cc9623210cf18cce3286514c2b31a2940e0c583a1b951eebbd269a377f718d3fdc800b7887e5673be2bed804095818690e96044de75fcdb1a870bc6d27592a7f3a07a602b1fa49560cd98b624ff2b7dd2ed8c04a060a99abaaa3cc1402c6cf17ca26db2f34a79188f13ef5f556245de1f20c51dd17225770719b407505e6584f4b0f675e2a8ad7db7cfcdf0f47c59c0f577d16af262763abdacb892787f83c9c62e4c64ef34f2828c12c8bd140e8bcf87d01ae4d13bf9afb2e2e0de09ddb3bffd899bc9d431cb5dc505e364ca1c5856e4042cfbf9d9dd43341fb856791036f33d84579cd3179fc30bc72383556fbf20d2063056de92899d18d439bd330e9d238dbebe978c42a01462303a94684d907cde6256284d0ea8a40c90fb0b6f72aded5ca0159e0678d9cae71157f3b0da06fa70660ee98f9fe2a30822cfc3c81c1e5a3d985131cb94e1a131036256066a35de074555e21cc2c57784bafc05fa06749221d3e4ba840900aa864a7c30c9900f819c0cfd8d0c72501df0b3f964e1d96415b63a7de78c9750943104c40866b9b021ff6fb8d05d7b9429084b325683e8751ae77ed4e5249edfe3231c4c0d85dddf7cae55c648341855ff070e03c47594da97eaf8c82699260df61af3a29eaf7a6b83443929c950cf1fb7cfbf03490e872ce0e46a793586a56eefa2b3fead7447383e5e2e8925a2334ff1b19dead9bd654a387ce0a21addbc34db3c6218d226ba206def3f8a43f0441193a9d46f91cbebb8fa21cb1ef873b56aa6dc207f25ae2d960106e10bf8ad43ba22ca26f317a591d65439042fa336f799e1596ed102a007464180819c22449adff2f4e53069f486d4c2a8697766b1348fa89fe9cfbfb8152fb472e7578673d6f7bb7defedf327e1640c499dc4850b62e50f49de343af96360f5ff177f5c5d88726b1c3ccb967ef860a4c279d0e4f00210f4f7a1015655ae65480874827446cd389a8d60de8d3af1cf5c1e1c08b992ad30e513f76e5926bb73fab8af159998be9e150fcffbf2fd15fe60333bae0b71fe4cd6869cb0f7c567472257b6d56b97fce02b9b5a45762cf711fe6dab92795994b6dc04795afee74935d20996c57355d76ce7bd1d4021b0d9791ef78b085f75bba2d6998c3939ae23419dfe4dc618d251f99ec59476f835e420d3865d7ddf104c06c6e9eda9498665b1a95a695a0e35c094b1b6922c04103d2ad3003e192965e5ae41232f7a99b68503b325fe92c57459d99b389bf53e3266028c5488855dff4ca0dfccd4e29ece2ddcd57358865324ee06ed3219a1fc5717bd9d8e50484af13e29a36f7e93d101b3d667e9185ceda6b57994aef3a6fc5dc941871bed2e077e4677bee40990a71e4a736b691ca9142ce3ca21980d5c4f328bd129343597a130e953cf1ad4d761abae36fed0eb0c0b8705285521b8f233", @generic="2fa02c9cf90a76df0448e868cb530c73c05433f3c791ae93beea083ed092c2e120cad1bd5f9a63ce87da5fbbef9b1b5dbe572054592e947371969dd648c0da03260777834dbe40409b51c441ea406d237f0110822013603eb764d4c667aed09d2d8afd8338cb6a9bd014ce6552be31ab19138a82096e7679581692c146856f7f247f"]}, 0x1218}], 0x2, &(0x7f0000001800)=[@cred={{0x1c, 0x1, 0x2, {r13, r14, r16}}}, @cred={{0x1c, 0x1, 0x2, {r17, 0xee01, r18}}}], 0x40, 0x8000}, 0x8000) [ 206.204408] should_failslab+0xdb/0x130 [ 206.204421] __kmalloc+0x2f0/0x7a0 [ 206.204434] ? __list_lru_init+0x6b/0x660 [ 206.204447] __list_lru_init+0x6b/0x660 [ 206.204460] sget_userns+0x4e0/0xc30 [ 206.204469] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 206.204483] ? kernfs_sop_show_options+0x190/0x190 [ 206.218770] kernfs_mount_ns+0xe9/0x790 [ 206.218786] sysfs_mount+0xaa/0x170 [ 206.251447] ? sysfs_kill_sb+0x40/0x40 [ 206.255675] mount_fs+0x97/0x2a1 [ 206.259048] vfs_kern_mount.part.0+0x5e/0x3d0 [ 206.263539] do_mount+0x417/0x27d0 [ 206.267085] ? copy_mount_string+0x40/0x40 [ 206.271328] ? memdup_user+0x58/0xa0 [ 206.275037] ? copy_mount_options+0x1fe/0x2f0 [ 206.279531] SyS_mount+0xab/0x120 [ 206.282981] ? copy_mnt_ns+0x8c0/0x8c0 [ 206.286854] do_syscall_64+0x1e8/0x640 [ 206.291165] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.296003] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.301176] RIP: 0033:0x459f49 [ 206.304370] RSP: 002b:00007f7361833c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:51:51 executing program 5 (fault-call:3 fault-nth:8): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) [ 206.312063] RAX: ffffffffffffffda RBX: 00007f7361833c90 RCX: 0000000000459f49 [ 206.319321] RDX: 0000000020000500 RSI: 0000000020000480 RDI: 0000000000000000 [ 206.326570] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 206.333837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73618346d4 [ 206.341094] R13: 00000000004c69b2 R14: 00000000004dbe18 R15: 0000000000000004 05:51:51 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x7, 0x7, 0x7f, 0x81, 0xfe, 0x75}}, 0x8) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000080)="a572ccb7522c9e5b47feb7704d130ee03d78394d8720b8d284206caf9da2ecb468ca8a61b49f350185e08e6134aab898fa958fc3f2f62c9524544a40bb8806aac832e305dce1a3e672c6c40bd353ae84ac44d094e20fc26b012550e8bf1649dcdc8fcf23fcd0b0b10e2eb46cf568c525") ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003}) [ 206.375064] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 05:51:51 executing program 2: socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:51:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) [ 206.436317] IPVS: ip_vs_svc_hash(): request for already hashed, called from do_ip_vs_set_ctl+0xbcb/0xcb0 [ 206.453848] FAULT_INJECTION: forcing a failure. [ 206.453848] name failslab, interval 1, probability 0, space 0, times 0 [ 206.488228] FAULT_INJECTION: forcing a failure. [ 206.488228] name failslab, interval 1, probability 0, space 0, times 0 [ 206.502964] CPU: 1 PID: 17221 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 206.510010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.519378] Call Trace: [ 206.522073] dump_stack+0x138/0x197 [ 206.525716] should_fail.cold+0x10f/0x159 [ 206.529875] should_failslab+0xdb/0x130 [ 206.535452] __kmalloc+0x2f0/0x7a0 [ 206.538998] ? lock_downgrade+0x740/0x740 [ 206.543152] ? register_shrinker+0xbd/0x220 [ 206.547483] register_shrinker+0xbd/0x220 [ 206.552772] sget_userns+0x9bf/0xc30 [ 206.556498] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 206.561168] ? kernfs_sop_show_options+0x190/0x190 [ 206.566098] kernfs_mount_ns+0xe9/0x790 [ 206.570072] sysfs_mount+0xaa/0x170 [ 206.573696] ? sysfs_kill_sb+0x40/0x40 [ 206.577584] mount_fs+0x97/0x2a1 [ 206.580951] vfs_kern_mount.part.0+0x5e/0x3d0 [ 206.586399] do_mount+0x417/0x27d0 [ 206.589943] ? copy_mount_string+0x40/0x40 [ 206.594176] ? memdup_user+0x58/0xa0 [ 206.597905] ? copy_mount_options+0x1fe/0x2f0 [ 206.602400] SyS_mount+0xab/0x120 [ 206.605848] ? copy_mnt_ns+0x8c0/0x8c0 [ 206.609731] do_syscall_64+0x1e8/0x640 [ 206.613610] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.619323] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.625284] RIP: 0033:0x459f49 [ 206.628468] RSP: 002b:00007f7361854c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:51:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) [ 206.636168] RAX: ffffffffffffffda RBX: 00007f7361854c90 RCX: 0000000000459f49 [ 206.643432] RDX: 0000000020000500 RSI: 0000000020000480 RDI: 0000000000000000 [ 206.650693] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 206.658058] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73618556d4 [ 206.665334] R13: 00000000004c69b2 R14: 00000000004dbe18 R15: 0000000000000004 [ 206.672617] CPU: 0 PID: 17224 Comm: syz-executor.0 Not tainted 4.14.150 #0 [ 206.679641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.689030] Call Trace: [ 206.691625] dump_stack+0x138/0x197 [ 206.695231] kasan: CONFIG_KASAN_INLINE enabled [ 206.699835] should_fail.cold+0x10f/0x159 [ 206.699860] should_failslab+0xdb/0x130 [ 206.699872] __kmalloc+0x2f0/0x7a0 [ 206.699891] ? __mutex_unlock_slowpath+0x71/0x800 [ 206.699902] ? simple_xattr_alloc+0x31/0xa0 [ 206.704208] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 206.708728] simple_xattr_alloc+0x31/0xa0 [ 206.708744] simple_xattr_set+0x3f/0x590 [ 206.708760] kernfs_xattr_set+0x8a/0xb0 [ 206.712572] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 206.717102] ? kernfs_xattr_get+0xb0/0xb0 [ 206.721397] Modules linked in: [ 206.728741] __vfs_setxattr+0xd8/0x130 [ 206.736897] ? xattr_resolve_name+0x360/0x360 [ 206.740846] CPU: 1 PID: 17221 Comm: syz-executor.5 Not tainted 4.14.150 #0 [ 206.747059] ? evm_protect_xattr.isra.0+0x74/0x360 [ 206.751176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.754348] __vfs_setxattr_noperm+0x102/0x3c0 [ 206.758207] task: ffff888099ac61c0 task.stack: ffff888064fc0000 [ 206.762683] vfs_setxattr+0xc5/0xf0 [ 206.770023] RIP: 0010:__list_del_entry_valid+0x85/0xf5 [ 206.774928] setxattr+0x1de/0x350 [ 206.784270] RSP: 0018:ffff888064fc7b30 EFLAGS: 00010246 [ 206.788938] ? vfs_setxattr+0xf0/0xf0 [ 206.798666] ? __lock_is_held+0xb6/0x140 [ 206.803916] RAX: dffffc0000000000 RBX: 00000000fffffff4 RCX: 0000000000000000 [ 206.807360] ? check_preemption_disabled+0x3c/0x250 [ 206.812697] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88808ee90120 [ 206.816479] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 206.820511] RBP: ffff888064fc7b48 R08: dffffc0000000000 R09: ffffffff88c9f878 [ 206.827852] ? rcu_read_lock_sched_held+0x110/0x130 [ 206.832852] R10: ffff888064fc7b48 R11: ffff888099ac61c0 R12: 0000000000000000 [ 206.840217] ? preempt_count_add+0xbc/0x1a0 [ 206.845652] R13: 0000000000000000 R14: ffff88808ee90118 R15: ffff88808ee90120 [ 206.852913] ? __mnt_want_write+0x1e3/0x270 [ 206.857911] FS: 00007f7361855700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 206.865182] path_setxattr+0x11f/0x140 [ 206.869477] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 206.876730] ? setxattr+0x350/0x350 [ 206.881024] CR2: 0000000000dbe470 CR3: 000000006ae14000 CR4: 00000000001406e0 [ 206.889242] ? SyS_write+0x15e/0x230 [ 206.893132] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 206.899015] SyS_lsetxattr+0x38/0x50 [ 206.902603] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 206.909864] ? SyS_setxattr+0x50/0x50 [ 206.913545] Call Trace: [ 206.920801] do_syscall_64+0x1e8/0x640 [ 206.924487] kernfs_kill_sb+0x62/0x1e0 [ 206.931730] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.935510] ? lock_downgrade+0x740/0x740 [ 206.938071] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.941928] sysfs_kill_sb+0x23/0x40 [ 206.945790] RIP: 0033:0x459f49 [ 206.950608] deactivate_locked_super+0x74/0xe0 [ 206.954725] RSP: 002b:00007fec9efa5c78 EFLAGS: 00000246 [ 206.959893] sget_userns+0x9d9/0xc30 [ 206.963578] ORIG_RAX: 00000000000000bd [ 206.966751] ? kernfs_sop_show_path+0x1b0/0x1b0 [ 206.971304] RAX: ffffffffffffffda RBX: 00007fec9efa5c90 RCX: 0000000000459f49 [ 206.976644] ? kernfs_sop_show_options+0x190/0x190 [ 206.980342] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 206.984311] kernfs_mount_ns+0xe9/0x790 [ 206.988952] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 206.996206] sysfs_mount+0xaa/0x170 [ 207.001105] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec9efa66d4 [ 207.008355] ? sysfs_kill_sb+0x40/0x40 05:51:52 executing program 0 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 05:51:52 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x8001003}) [ 207.012300] R13: 00000000004cf6c0 R14: 00000000004dbb00 R15: 0000000000000003 [ 207.019553] mount_fs+0x97/0x2a1 [ 207.045933] vfs_kern_mount.part.0+0x5e/0x3d0 [ 207.050540] do_mount+0x417/0x27d0 [ 207.054096] ? copy_mount_string+0x40/0x40 [ 207.058336] ? memdup_user+0x58/0xa0 [ 207.062052] ? copy_mount_options+0x1fe/0x2f0 [ 207.066534] SyS_mount+0xab/0x120 [ 207.069974] ? copy_mnt_ns+0x8c0/0x8c0 [ 207.073868] do_syscall_64+0x1e8/0x640 [ 207.077759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.082611] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 207.087791] RIP: 0033:0x459f49 05:51:52 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000240)={0x0, 0x0, 0x2}) 05:51:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) dup2(r2, r1) [ 207.090978] RSP: 002b:00007f7361854c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 207.098697] RAX: ffffffffffffffda RBX: 00007f7361854c90 RCX: 0000000000459f49 [ 207.105989] RDX: 0000000020000500 RSI: 0000000020000480 RDI: 0000000000000000 [ 207.113260] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 207.120522] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73618556d4 [ 207.127781] R13: 00000000004c69b2 R14: 00000000004dbe18 R15: 0000000000000004 05:51:52 executing program 2: socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) [ 207.135058] Code: c5 0f 84 e1 00 00 00 48 b8 00 02 00 00 00 00 ad de 49 39 c4 0f 84 e2 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 75 53 49 8b 14 24 4c 39 f2 0f 85 99 00 00 00 49 8d [ 207.155376] RIP: __list_del_entry_valid+0x85/0xf5 RSP: ffff888064fc7b30 [ 207.163775] ---[ end trace ef54147555785999 ]--- [ 207.168554] Kernel panic - not syncing: Fatal exception [ 207.175483] Kernel Offset: disabled [ 207.179111] Rebooting in 86400 seconds..