2c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:35:59 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 3: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:00 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 3: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 3: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:00 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 3: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:00 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 3: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:00 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:00 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:00 executing program 3: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:01 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:01 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:01 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:01 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:01 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:01 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:01 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:01 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:01 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:02 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:02 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:02 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:02 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:02 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:02 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:03 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(lrw-serpent-sse2,crct10dif-arm64-ce)\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0) getsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f0000000080)=0x7, &(0x7f00000000c0)=0x4) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r5}}]}) 17:36:04 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 5: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 5: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1143.218661] hfs: gid requires an argument 17:36:04 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1143.247382] hfs: unable to parse mount options 17:36:04 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:04 executing program 5: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(lrw-serpent-sse2,crct10dif-arm64-ce)\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0) getsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f0000000080)=0x7, &(0x7f00000000c0)=0x4) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r5}}]}) 17:36:05 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:05 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:05 executing program 5: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:05 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:05 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:05 executing program 5: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:05 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:05 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:05 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:05 executing program 5: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1144.144112] hfs: gid requires an argument [ 1144.190523] hfs: unable to parse mount options 17:36:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:06 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(lrw-serpent-sse2,crct10dif-arm64-ce)\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0) getsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f0000000080)=0x7, &(0x7f00000000c0)=0x4) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r5}}]}) 17:36:06 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:06 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:06 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:06 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:06 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:06 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:06 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:06 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:06 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:06 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1145.065722] hfs: gid requires an argument [ 1145.087221] hfs: unable to parse mount options 17:36:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(lrw-serpent-sse2,crct10dif-arm64-ce)\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r5}}]}) 17:36:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:07 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:07 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:07 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:07 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:07 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:07 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:07 executing program 2: exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:07 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1145.975671] hfs: gid requires an argument [ 1145.995969] hfs: unable to parse mount options 17:36:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(lrw-serpent-sse2,crct10dif-arm64-ce)\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r5}}]}) 17:36:07 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:07 executing program 2: exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:07 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:07 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:08 executing program 2: exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:08 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:08 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:08 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:08 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:08 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) [ 1146.872381] hfs: gid requires an argument [ 1146.883085] hfs: unable to parse mount options 17:36:08 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:08 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:08 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:08 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(lrw-serpent-sse2,crct10dif-arm64-ce)\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r5}}]}) 17:36:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:08 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:09 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:09 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:09 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:09 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1147.831508] hfs: gid requires an argument 17:36:09 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:09 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1147.856608] hfs: unable to parse mount options 17:36:09 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17:36:09 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(lrw-serpent-sse2,crct10dif-arm64-ce)\x00'}, 0x58) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid'}}]}) 17:36:09 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:09 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:09 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17:36:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, 0x0, 0x0) 17:36:09 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17:36:09 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:10 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17:36:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, 0x0, 0x0) 17:36:10 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1148.708841] hfs: can't find a HFS filesystem on dev loop4 17:36:10 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(lrw-serpent-sse2,crct10dif-arm64-ce)\x00'}, 0x58) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid'}}]}) 17:36:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:10 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17:36:10 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 17:36:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, 0x0, 0x0) 17:36:10 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:10 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17:36:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 17:36:10 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 17:36:10 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 17:36:10 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) [ 1149.670113] hfs: can't find a HFS filesystem on dev loop4 17:36:11 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(lrw-serpent-sse2,crct10dif-arm64-ce)\x00'}, 0x58) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid'}}]}) 17:36:11 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 17:36:11 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 17:36:11 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 17:36:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 17:36:11 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:11 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 17:36:11 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 17:36:11 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 17:36:11 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1150.573711] hfs: can't find a HFS filesystem on dev loop4 17:36:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r4}}]}) 17:36:12 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 17:36:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 17:36:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:12 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:12 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 17:36:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 17:36:12 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 17:36:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:12 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:12 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1151.465721] hfs: gid requires an argument 17:36:12 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) [ 1151.509437] hfs: unable to parse mount options 17:36:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r4}}]}) 17:36:13 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:13 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:13 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:13 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x0, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:13 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:13 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x54, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}]}, 0x54}}, 0x0) 17:36:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x54, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}]}, 0x54}}, 0x0) [ 1152.335175] hfs: gid requires an argument [ 1152.353563] hfs: unable to parse mount options 17:36:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r4}}]}) 17:36:14 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:14 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:14 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x54, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}]}, 0x54}}, 0x0) 17:36:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:14 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:14 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x54, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x54}}, 0x0) 17:36:14 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) [ 1153.215940] hfs: gid requires an argument 17:36:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x54, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x54}}, 0x0) [ 1153.269344] hfs: unable to parse mount options 17:36:14 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:14 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x54, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x4}]}, 0x54}}, 0x0) 17:36:14 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x1c}}, 0x0) [ 1153.520329] hfs: gid requires an argument [ 1153.527598] hfs: unable to parse mount options 17:36:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x1c}}, 0x0) 17:36:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x1c}}, 0x0) 17:36:15 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1153.766421] hfs: gid requires an argument [ 1153.773114] hfs: unable to parse mount options 17:36:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x4c, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x4c}}, 0x0) 17:36:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x4c, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x4c}}, 0x0) 17:36:15 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17:36:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x4c, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x4c}}, 0x0) [ 1154.046635] hfs: gid requires an argument [ 1154.059246] hfs: unable to parse mount options 17:36:15 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:15 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17:36:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2c, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x2c}}, 0x0) 17:36:15 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 1: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) [ 1154.317301] hfs: gid requires an argument [ 1154.329895] hfs: unable to parse mount options 17:36:15 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17:36:15 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2c, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x2c}}, 0x0) 17:36:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:15 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 17:36:15 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:15 executing program 1: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2c, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x2c}}, 0x0) 17:36:16 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1154.653428] hfs: gid requires an argument [ 1154.669011] hfs: unable to parse mount options 17:36:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:16 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 17:36:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:16 executing program 1: r0 = socket(0x0, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:16 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:16 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:16 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 17:36:16 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:16 executing program 1: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1155.032668] hfs: gid requires an argument [ 1155.060137] hfs: unable to parse mount options 17:36:16 executing program 1: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:16 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:16 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 17:36:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:17 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:17 executing program 1: r0 = socket(0x11, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:17 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 17:36:17 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) [ 1155.773082] hfs: gid requires an argument [ 1155.789110] hfs: unable to parse mount options 17:36:17 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:17 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 17:36:17 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:17 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) [ 1156.008325] hfs: gid requires an argument [ 1156.021140] hfs: unable to parse mount options 17:36:17 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:17 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:17 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:17 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:17 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x2d}}], 0x10) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:17 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) [ 1156.392179] hfs: gid requires an argument [ 1156.402624] hfs: unable to parse mount options 17:36:17 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:17 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:17 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:17 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:18 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:18 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:18 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1156.616335] hfs: gid requires an argument [ 1156.635270] hfs: unable to parse mount options 17:36:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x134}}, 0x0) 17:36:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:18 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:18 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) [ 1156.953959] hfs: gid requires an argument [ 1156.977083] hfs: unable to parse mount options 17:36:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mlockall(0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:18 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:18 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:18 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:18 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1157.297063] hfs: can't find a HFS filesystem on dev loop4 17:36:18 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:18 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:18 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:18 executing program 0: open(0x0, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1157.600933] hfs: can't find a HFS filesystem on dev loop4 17:36:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid', 0x3d, r1}}]}) socket$inet6_sctp(0xa, 0x1, 0x84) 17:36:19 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:19 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:19 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:19 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:19 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) [ 1157.906607] hfs: can't find a HFS filesystem on dev loop4 [ 1157.943843] hfs: gid requires an argument [ 1157.948588] hfs: unable to parse mount options 17:36:19 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid', 0x3d, r1}}]}) socket$inet6_sctp(0xa, 0x1, 0x84) 17:36:19 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) 17:36:19 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x0, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x58}}, 0x0) [ 1158.206882] hfs: gid requires an argument [ 1158.217107] hfs: gid requires an argument [ 1158.226596] hfs: unable to parse mount options [ 1158.244200] hfs: unable to parse mount options 17:36:19 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) [ 1158.436483] hfs: gid requires an argument [ 1158.443244] hfs: unable to parse mount options 17:36:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:20 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid', 0x3d, r1}}]}) socket$inet6_sctp(0xa, 0x1, 0x84) 17:36:20 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0xc01c64ae, &(0x7f0000000000)={0x81, 0x10000, 0x800, 0x1, 0x0, 0x10000, 0x4d3}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c0000002c00270d000000000000000004000000", @ANYRES32, @ANYBLOB="0000000000000000ffff0000080001"], 0x4c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) [ 1158.748533] hfs: gid requires an argument [ 1158.774845] hfs: unable to parse mount options [ 1158.779118] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 17:36:20 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1158.799781] hfs: gid requires an argument 17:36:20 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) [ 1158.823509] hfs: unable to parse mount options 17:36:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid', 0x3d, r1}}]}) 17:36:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x1, 0x7ffe, 0x0, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) ioctl$FS_IOC_ENABLE_VERITY(r5, 0x40806685, &(0x7f00000003c0)={0x1, 0x1, 0x1000, 0xc1, &(0x7f0000000100)="1bd2e8153d70d91913f477d7e42b2615b9a43240fd0540d44866892790f5c3c45460218e0c4d932e4e52bc1743e4b36681982a2ab05d4e81bee8a0ffeacdf7aa1460183935ba8ce2bc4df9625bb3628e1549a5a9422a84e825b6fa849e7b527a5a5dee9c85601ea5e3551e7e3b969884238d76a53acd36f6584e5d3e277523ec0de06d669639b509a90c8a9bb48b3db3676280167ff590e5124a8c0bde639d692d814fb6bb1a2e62ab0613cc39d91273a6141a825524727462e51a111e7d39a25c", 0xfb, 0x0, &(0x7f00000002c0)="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"}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000004c0)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000718000/0x4000)=nil, &(0x7f00002c1000/0x3000)=nil, &(0x7f00000c8000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006a7000/0x3000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f00000b2000/0x3000)=nil, &(0x7f0000ab5000/0x3000)=nil, &(0x7f000081f000/0x4000)=nil, &(0x7f0000435000/0x3000)=nil, &(0x7f0000000440)="6fcf0de697f04cf2cc77b776a6abac433fbca29bbbe25d3c426683e93917477542339af5f3915e3aec2c30a4f15687c53b136624bbf087a15317d1360658717185f72528fe51945b2c5aaee9217d68419a4c4bb8467c6a497a4a326a16be6fe86ab5cdd3327294d9bd91ec2509dfcb0f79e2988172ac21c665539646596c97", 0x7f}, 0x68) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @dev={0xfe, 0x80, [], 0x32}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:20 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1159.210665] hfs: gid requires an argument [ 1159.228618] hfs: unable to parse mount options [ 1159.229140] hfs: gid requires an argument [ 1159.260105] hfs: unable to parse mount options 17:36:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:20 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:20 executing program 2: socket$netlink(0x10, 0x3, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:20 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) [ 1159.673448] hfs: gid requires an argument [ 1159.709515] hfs: invalid session number or type of track 17:36:21 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:21 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) [ 1159.739059] hfs: unable to parse mount options [ 1159.807034] hfs: can't find a HFS filesystem on dev loop2 17:36:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:21 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:21 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x1, 0x7ffe, 0x0, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r5, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) ioctl$FS_IOC_ENABLE_VERITY(r5, 0x40806685, &(0x7f00000003c0)={0x1, 0x1, 0x1000, 0xc1, &(0x7f0000000100)="1bd2e8153d70d91913f477d7e42b2615b9a43240fd0540d44866892790f5c3c45460218e0c4d932e4e52bc1743e4b36681982a2ab05d4e81bee8a0ffeacdf7aa1460183935ba8ce2bc4df9625bb3628e1549a5a9422a84e825b6fa849e7b527a5a5dee9c85601ea5e3551e7e3b969884238d76a53acd36f6584e5d3e277523ec0de06d669639b509a90c8a9bb48b3db3676280167ff590e5124a8c0bde639d692d814fb6bb1a2e62ab0613cc39d91273a6141a825524727462e51a111e7d39a25c", 0xfb, 0x0, &(0x7f00000002c0)="6eb3264707f7b1bcc6326e34de46f779deed89b6ad6a35c259c8a0209ce525b9caf67c6b8ccd2f3679d5cea8ff15cfc063e1d9b7339b3b1cd0fc22478942fb83f2e7c2605f2f5c7ec83a84d5a463302f1990129c4ef8710e3ae7e3788a97d5542dc5182af8d57c23cc450c3a3aa81285e0825e39d75feef40b02912f148b53162ebde7c73c18bff333a92ea8621c2ca6e555d5763ef5ef074b7f1f185fac28049ff7c7135870f07de85c710431083a0cd8698e5b5f4497d5cd357d1cfd2bcae9aec46f60e5d864a89d83030d3c55cde49470656cad13fc73ef6acfbf83da0761b078ebe51d95f0546cf3885bd6899cd914d2936373c6d3ad44ec3e"}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000004c0)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000718000/0x4000)=nil, &(0x7f00002c1000/0x3000)=nil, &(0x7f00000c8000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006a7000/0x3000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f00000b2000/0x3000)=nil, &(0x7f0000ab5000/0x3000)=nil, &(0x7f000081f000/0x4000)=nil, &(0x7f0000435000/0x3000)=nil, &(0x7f0000000440)="6fcf0de697f04cf2cc77b776a6abac433fbca29bbbe25d3c426683e93917477542339af5f3915e3aec2c30a4f15687c53b136624bbf087a15317d1360658717185f72528fe51945b2c5aaee9217d68419a4c4bb8467c6a497a4a326a16be6fe86ab5cdd3327294d9bd91ec2509dfcb0f79e2988172ac21c665539646596c97", 0x7f}, 0x68) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @dev={0xfe, 0x80, [], 0x32}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:21 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) [ 1160.108263] hfs: gid requires an argument [ 1160.130370] hfs: unable to parse mount options [ 1160.153944] hfs: invalid session number or type of track [ 1160.165940] hfs: can't find a HFS filesystem on dev loop2 17:36:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:21 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:21 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:21 executing program 2: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:21 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:21 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:21 executing program 2: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) [ 1160.621153] hfs: gid requires an argument [ 1160.625747] hfs: unable to parse mount options 17:36:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:22 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:22 executing program 3: socket$netlink(0x10, 0x3, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:22 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) [ 1161.028895] hfs: gid requires an argument [ 1161.041927] hfs: unable to parse mount options [ 1161.149592] hfs: invalid session number or type of track [ 1161.162471] hfs: can't find a HFS filesystem on dev loop3 17:36:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) 17:36:22 executing program 2: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:22 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:22 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:22 executing program 3: socket$netlink(0x10, 0x3, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:22 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x134}}, 0x0) 17:36:22 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:22 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) [ 1161.481253] hfs: invalid session number or type of track [ 1161.488061] hfs: gid requires an argument [ 1161.516553] hfs: unable to parse mount options [ 1161.523258] hfs: can't find a HFS filesystem on dev loop3 17:36:23 executing program 3: socket$netlink(0x10, 0x3, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:23 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:23 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) [ 1161.881952] hfs: invalid session number or type of track [ 1161.914167] hfs: can't find a HFS filesystem on dev loop3 [ 1161.930612] hfs: can't find a HFS filesystem on dev loop4 17:36:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) 17:36:23 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:23 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:23 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:23 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:23 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) [ 1162.298840] hfs: can't find a HFS filesystem on dev loop4 [ 1162.306176] hfs: invalid session number or type of track 17:36:23 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:23 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:23 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:23 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1162.346192] hfs: can't find a HFS filesystem on dev loop3 17:36:23 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:24 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1162.777708] hfs: can't find a HFS filesystem on dev loop4 17:36:24 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:24 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:24 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid'}}]}) 17:36:24 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:24 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) 17:36:24 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:24 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:24 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:24 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1163.301206] hfs: can't find a HFS filesystem on dev loop4 17:36:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid'}}]}) 17:36:24 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:25 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}]}) 17:36:25 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:25 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:25 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) [ 1163.677872] hfs: can't find a HFS filesystem on dev loop4 17:36:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid'}}]}) [ 1163.775997] hfs: invalid session number or type of track [ 1163.777977] hfs: invalid session number or type of track [ 1163.796287] hfs: can't find a HFS filesystem on dev loop5 [ 1163.814352] hfs: can't find a HFS filesystem on dev loop2 [ 1163.837714] hfs: can't find a HFS filesystem on dev loop4 17:36:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:25 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:25 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 17:36:25 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 17:36:25 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) [ 1164.099302] hfs: invalid session number or type of track [ 1164.115370] hfs: can't find a HFS filesystem on dev loop4 [ 1164.121699] hfs: can't find a HFS filesystem on dev loop2 17:36:25 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) [ 1164.161052] hfs: can't find a HFS filesystem on dev loop5 17:36:25 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:25 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 17:36:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:25 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) [ 1164.463009] hfs: can't find a HFS filesystem on dev loop2 [ 1164.485556] hfs: can't find a HFS filesystem on dev loop4 17:36:25 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) [ 1164.506144] hfs: invalid session number or type of track [ 1164.514944] hfs: can't find a HFS filesystem on dev loop5 17:36:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:26 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:26 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 17:36:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:26 executing program 5: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:26 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) [ 1164.995222] hfs: can't find a HFS filesystem on dev loop2 17:36:26 executing program 5: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:26 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) [ 1165.054495] hfs: can't find a HFS filesystem on dev loop4 17:36:26 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:26 executing program 5: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:27 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:27 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 17:36:27 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:27 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 17:36:27 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}]}) 17:36:27 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:27 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:27 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) [ 1166.248513] hfs: invalid session number or type of track [ 1166.268019] hfs: can't find a HFS filesystem on dev loop3 17:36:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:28 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}, {@gid={'gid'}}]}) 17:36:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x800, 0x8001) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000140)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_TIMERSLACK(0x1d, 0x7) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x4) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:28 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 17:36:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 17:36:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) [ 1166.677504] hfs: can't find a HFS filesystem on dev loop3 17:36:28 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:28 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) 17:36:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 17:36:28 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1167.036721] hfs: can't find a HFS filesystem on dev loop3 17:36:28 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:28 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c0000002c00270d000000000000000004000000", @ANYRES32, @ANYBLOB="0000000000000000ffff0000080001"], 0x4c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:28 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 17:36:28 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1167.508904] hfs: can't find a HFS filesystem on dev loop3 [ 1167.531487] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 17:36:28 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000002c00270d000000000000000004000000", @ANYRES32, @ANYBLOB="0000000000000000ffff0000080001acdef89cacd817011d769902e0a81ace88965e4bc7477c9ba5dffcfa92a9e84100bd712f1d20561f0dcc0d89b69267ec5699593515b8663865c6af50c1789ba3940f5647f01789fd"], 0x4c}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:29 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:29 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@session={'session'}}]}) 17:36:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x39}, 0x400000}, 0x1c) listen(r4, 0x9) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000180)=""/125, &(0x7f0000000240)=0x7d) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10380, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1167.843873] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 17:36:29 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1167.995579] hfs: invalid session number or type of track [ 1168.002664] hfs: can't find a HFS filesystem on dev loop5 [ 1168.014504] IPVS: length: 125 != 24 17:36:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000180)={0x1, 0x0, {0x100, 0x80, 0x1009, 0x0, 0xa, 0x7, 0x2, 0x5}}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000200)=0x4) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r3}}]}) r4 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1\x00', 0x4080, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r4, 0x80045017, &(0x7f0000000400)) 17:36:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:29 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 17:36:29 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) [ 1168.456784] hfs: can't find a HFS filesystem on dev loop5 [ 1168.589184] hfs: gid requires an argument 17:36:30 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1168.651156] hfs: unable to parse mount options 17:36:30 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1168.707106] hfs: can't find a HFS filesystem on dev loop4 17:36:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="006a01c8e78791428229dd0e59e2030a8b00180621f9588f9d6e65020af0dd6915d25a6892c948a4cb09db7eacf6564f57c33457e626eca0a40df0d9a9ddcf05cce2a0b7e6b16d0a408c096a6343b3f287e37969dcb374d98ccfd2740eff9f2d3706623056b80927ef800e03e3e4e1943c61a895d137fb358f10206d6c3524a0ace905dbc2f6d889bae0000b90"]) 17:36:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r2, 0x9) bind$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e21, 0xfffffffa, @empty, 0x1}, 0x1c) vmsplice(r2, &(0x7f0000000280)=[{&(0x7f0000000000)="97a9e2bc327be278747623d74194cf8af9cde656995bcd3add754442f7cb7785297bb9060ac21fdf41a3ac7e9d9476853f8f3cc559562512e8551dc028fedd2474626162c644b6a8e4e3737a770812d471d115f5c4c4dc73c6522feed50ecd4aac7249ca1500c98f26f22e3339419d8b26d7ae1235490e8e9e815971f1ebe077b30809a9a44d29339897d1d9347a4f14f77c1b993d97bee9bb2e1b882f4a1008f5a62937fa016fe6113a0c46bacdfc3f8a79fc28e83124facd0901f7b1c08d7272121c507216e361a3f4c3b424fac596571714c97b03035f2e0ed7de69ae70f2cb9974c18963284e9f", 0xe9}, {&(0x7f0000000100)="002293e121385d03a360030bca35067025a93b909a560e9915ae2308e8cd33ff9a2b4c27223ee07cac7ba8d32dea940c1a1aa9a554ad66473207c35d2878071dd2592ea9", 0x44}, {&(0x7f0000000180)="b469ae2a54f9e222f8134ac03fda1e32789b0df615b937a405aa7b7ff0a78b76a2cef222b3ca8be1656cbc4cdd397c4d10bbbd76ce9961e37b39463e31ba647e9c8c26f5e0d073df4614862dc513ce7e2e47ded317644b462dc925b7e4ef46d07c7463c9dabce1ea88166d1f3a34d7b733dbc4ab14953f18019a9f2766ada1cbdffa94b0108a1199d8990957722e219bea45c5f85deb3e8d3be60c33e3d9a731fde26b8ec85921e32ca8f8e92fc073b3d7cf9201ae3e528115408c84c944efe3002cdfe92de2a6153a20398d4a4970f78e0e4a748c84664b503958d4f4161c0398e7dda8b6789c", 0xe7}], 0x3, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="31796e14e4cf56512c5a65169a8947a81eb16b9629ee6323f93b4645aa20d3e66c88f75443dea4db46b1cc68ac736a885fac0637837cf27cda8b0b6d545093d7856cf1bc6c810b6e2ba74a2c4651a896c12a0badbe305b61902842900b49cc7bf8b7377267c52dee0f67e9d3d8f66be0e0c424d702b844d21937947e49dd33d133535497de44b07e26c784e7ebe351d64b0c9f26602afa18a6f80ce1abdc0cf16f8e7cbddd5adbb1605194796f6e27de019bc6fa68eeedd0071d7917c34599dfbf33454296865efc11c6ca4607326c75afca3e4caa3b512b0fd5aae645726ec424b7a63599417df713fc0641186007b1dd6aa966", @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) 17:36:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) 17:36:30 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1168.819464] hfs: gid requires an argument [ 1168.828747] hfs: unable to parse mount options [ 1168.854765] hfs: can't find a HFS filesystem on dev loop5 17:36:30 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 17:36:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x438, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8}]}, @TIPC_NLA_LINK={0xa4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x305400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x81}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xd4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x800}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xabe}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80000001}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x401}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1000}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffff0000}]}, @TIPC_NLA_BEARER={0x20, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_NODE={0x1e0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "aeefe5aa0c8fa3e81d28dc3be398e6359af34498f03ed2e03d9f9df3259f2a41"}}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "c5e885bd39253d3f8391bc474d6e9f79a4bb73cdfe1035d7378b"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff0001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xbe, 0x3, "cde02bbe9ee8f0ed1bf6565e18af092ec790d5bda843f3c4f488c38ca1ebd139b7a74d9cd7319c497ef08cbfc2e7a844efe3aa4af1a0afc386207d702d55cb076efc3736543c1cf2b8faffc602336bfe90db8bf4f77febb12bcb1b267ee88b4817f7fdcce5465b89cc7a7644960e88bc9366f2fb9f57a6be3a13c25bb7e6bda0acb0dc332d6fb41277e79f91159eadbb5ad017c7eacde127e5ddd575f563de1fdb36856bc5f0c50f8bd34955b46318875b658298ab24344ab82b"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x71, 0x3, "7b68d1d976a224764dbffa82c19e3ec16c998a1f89fce4e8cf45515527f5b31f5ef871e7bd82cd6056ed8d96ca68fbfc6209a9b0d0200204cc98b38f23155e0e61f00a5fa782e0f83be16123baf4300ec24df7e63a2e94b04b729978d16bd7a2734b4d30af344eb93bbc70f614"}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x60, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffeb9}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xfc000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x200}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x438}, 0x1, 0x0, 0x0, 0x80}, 0x20008050) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) [ 1168.935123] hfs: can't find a HFS filesystem on dev loop4 17:36:30 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1168.989190] hfs: unable to parse mount options [ 1169.067489] hfs: can't find a HFS filesystem on dev loop5 [ 1169.089405] hfs: can't find a HFS filesystem on dev loop2 17:36:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) 17:36:30 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2008, &(0x7f0000000040)={[{@gid={'gid'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'smackfshat'}}]}) 17:36:30 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 1169.263920] hfs: can't find a HFS filesystem on dev loop4 [ 1169.294779] hfs: can't find a HFS filesystem on dev loop2 17:36:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x5, 0x8, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) sched_setattr(r5, &(0x7f0000000100)={0x38, 0x3, 0x1800002a, 0x831, 0x4, 0x2, 0x4, 0xfffffffffffffffe, 0x22, 0x10001}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid'}}]}) 17:36:30 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="67690600", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={r4}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000000)={r4, @in6={{0xa, 0x4e20, 0x5, @loopback, 0x20}}, 0xed7, 0x8, 0x1, 0x10001, 0x8000}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x7, 0xb4fc, 0x8001, 0x5, 0x5, 0x132, 0x40, 0x9, r5}, 0x20) 17:36:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) clock_settime(0x2, &(0x7f0000000100)={0x0, 0x3938700}) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$KDADDIO(r3, 0x4b34, 0x80000000) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:30 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1169.843707] hfs: unable to parse mount options 17:36:31 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1169.981053] hfs: can't find a HFS filesystem on dev loop4 17:36:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid'}}]}) 17:36:31 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x5, 0x8, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) sched_setattr(r5, &(0x7f0000000100)={0x38, 0x3, 0x1800002a, 0x831, 0x4, 0x2, 0x4, 0xfffffffffffffffe, 0x22, 0x10001}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1170.503828] hfs: can't find a HFS filesystem on dev loop4 17:36:32 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:32 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:32 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYRES64=r0, @ANYRES64=r0], 0x4c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) readv(r1, &(0x7f0000000780)=[{&(0x7f0000000000)=""/19, 0x13}, {&(0x7f0000000200)=""/167, 0xa7}, {&(0x7f00000002c0)=""/176, 0xb0}, {&(0x7f0000000380)=""/250, 0xfa}, {&(0x7f00000000c0)=""/78, 0x4e}, {&(0x7f0000000480)=""/182, 0xb6}, {&(0x7f0000000540)=""/161, 0xa1}, {&(0x7f0000000600)=""/106, 0x6a}, {&(0x7f0000000680)=""/91, 0x5b}, {&(0x7f0000000700)=""/103, 0x67}], 0xa) 17:36:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid'}}]}) 17:36:32 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 17:36:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r6, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) dup3(r5, r6, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1170.864922] hfs: can't find a HFS filesystem on dev loop4 17:36:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r3}}]}) 17:36:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:32 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) [ 1171.196331] hfs: gid requires an argument [ 1171.236549] hfs: unable to parse mount options 17:36:32 executing program 5: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@gid={'gid'}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@audit='audit'}, {@fowner_lt={'fowner<', r0}}, {@subj_type={'subj_type', 0x3d, ':\x1e\x00\x00\x00\x00\x00\x00\x00\xf5Jsu\xf9R\x11J['}}, {@smackfsfloor={'smackfsfloor', 0x3d, '$!:,]'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@uid_gt={'uid>', r0}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 17:36:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) 17:36:33 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:33 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20040844}, 0x40000041) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1171.634774] hfs: unable to parse mount options [ 1171.662241] hfs: can't find a HFS filesystem on dev loop4 17:36:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) 17:36:33 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20040844}, 0x40000041) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r6, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) dup3(r5, r6, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:33 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x18, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}]}}]}, 0x44}}, 0x0) 17:36:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1171.890853] hfs: can't find a HFS filesystem on dev loop4 17:36:33 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x101000, 0x4) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESOCT=r0], 0x4c}}, 0x11) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x34, r3, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x60, 0x0, @l2={'ib', 0x3a, 'batadv0\x00'}}}}}, 0xfccc}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x0, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44814}, 0x4004041) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r5, &(0x7f00000017c0), 0x375, 0x0) recvfrom$l2tp(r5, &(0x7f0000000000)=""/188, 0xbc, 0x40002043, &(0x7f00000000c0)={0x2, 0x0, @private}, 0x10) 17:36:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) 17:36:33 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) 17:36:33 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20040844}, 0x40000041) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:33 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) [ 1172.338908] hfs: can't find a HFS filesystem on dev loop4 [ 1172.352438] Bearer rejected, not supported in standalone mode 17:36:33 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20040844}, 0x40000041) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:33 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 17:36:33 executing program 2: r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYRES64=r1, @ANYBLOB="54d01c47f885cf31495e55caa6d2506e28ab11e685675eeae872d9dc9d319507c2484c8acd725e5374b9922c86f9809277f97038bd298b412fc4b4cedf178d9846f25fe8e717cbcf71b26ed8616f7eafef8f4487c2473647557a1fc5453f3b9e71a72273c035e771ffd48319c05acb28922400c6e6e2"]) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$SOUND_PCM_READ_RATE(r3, 0x80045002, &(0x7f0000000000)) 17:36:33 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x134, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x108, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x134}}, 0x0) [ 1172.582989] hfs: invalid session number or type of track [ 1172.605939] hfs: can't find a HFS filesystem on dev loop4 17:36:34 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20040844}, 0x40000041) socket(0x10, 0x80002, 0x0) 17:36:34 executing program 3: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = getpgrp(r0) r2 = syz_open_procfs(r1, &(0x7f0000000200)='ns\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) sendmsg$nl_route_sched(r2, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c0000002c00270d000000000000000004000000", @ANYRES32, @ANYBLOB="0000000000000000ff000070000000"], 0x4c}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000000c0)='./bus/file1\x00', 0x0, r5) setfsgid(r5) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x902, 0x0) ioctl$PPPIOCSFLAGS1(r6, 0x40047459, &(0x7f0000000240)=0x6042040) 17:36:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:34 executing program 4: r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYRES64=r1, @ANYBLOB="54d01c47f885cf31495e55caa6d2506e28ab11e685675eeae872d9dc9d319507c2484c8acd725e5374b9922c86f9809277f97038bd298b412fc4b4cedf178d9846f25fe8e717cbcf71b26ed8616f7eafef8f4487c2473647557a1fc5453f3b9e71a72273c035e771ffd48319c05acb28922400c6e6e2"]) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$SOUND_PCM_READ_RATE(r3, 0x80045002, &(0x7f0000000000)) 17:36:34 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1172.805727] hfs: unable to parse mount options 17:36:34 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1173.075765] hfs: unable to parse mount options [ 1173.189434] Unknown ioctl 1074033753 17:36:34 executing program 3: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e24, 0x5, @rand_addr=' \x01\x00'}, 0x6) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) sendmsg$OSF_MSG_REMOVE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x964, 0x1, 0x5, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [{{0x254, 0x1, {{0x3, 0x100}, 0x3, 0x4, 0x89bd, 0xffff, 0x28, 'syz0\x00', "ea27a953c2653d5b204193f7ac62d9e1fbbd53c87cece3d4f202f5bee4fec02f", "61b55a2954ca27c598e396d0135ad3c347298ce6ebe9877c57ace5b3a1cd21c7", [{0xb4, 0x8, {0x2, 0x3}}, {0xa3, 0x20, {0x0, 0x81}}, {0x7f, 0xf7de, {0x2, 0x1}}, {0x8, 0x7, {0x1, 0x6}}, {0x9, 0x81, {0x1, 0x89e}}, {0xffff, 0x4, {0x3, 0x8}}, {0x20, 0x9, {0x3, 0x10001}}, {0x2, 0x6f, {0x3, 0x4}}, {0x3, 0x6, {0x2, 0x3}}, {0x1000, 0x4, {0x5be02fef9686d904, 0x6}}, {0x8000, 0x5, {0x1, 0x173}}, {0x4, 0x7fff, {0x1, 0xdd}}, {0x7, 0x9, {0x2, 0x2fd7}}, {0x80, 0x7, {0x1, 0x80000000}}, {0x1ff}, {0x8, 0x6, {0x1}}, {0x0, 0x8000, {0x3, 0x401}}, {0x1000, 0x7, {0x3, 0x1}}, {0x4765, 0x2, {0x0, 0x200000}}, {0x3, 0x3, {0x0, 0x800}}, {0xff01, 0xd8, {0x3, 0x8}}, {0x3, 0x9a75, {0x2, 0x240}}, {0x3, 0xfc01, {0x2, 0x6}}, {0x53f4, 0x0, {0x0, 0x8000}}, {0x4, 0xd048, {0x3, 0x2}}, {0x35, 0x8, {0x0, 0xffffffff}}, {0x3, 0xffee, {0x2, 0x9}}, {0x9, 0xbb23, {0x3, 0x9464}}, {0xfe, 0xae0, {0x0, 0x7}}, {0x1ff, 0x3, {0x0, 0x200}}, {0x0, 0x9, {0x0, 0x2}}, {0x0, 0x4f91, {0x0, 0x8}}, {0xe1d, 0x1, {0x1, 0x3}}, {0x6, 0x2, {0x0, 0x9}}, {0x0, 0x17, {0x2, 0x81}}, {0x7, 0x1000, {0x0, 0x159}}, {0x6, 0x3, {0x0, 0x276}}, {0x697, 0x8, {0x0, 0x6}}, {0x0, 0x1, {0x0, 0x3}}, {0x3, 0x7, {0x0, 0xe18}}]}}}, {{0x254, 0x1, {{0x1, 0x3}, 0x20, 0x7, 0x2, 0xd88, 0x11, 'syz1\x00', "fc875030d2f678ff3687ae42e657f88296e18246931f5ccd913d9881ce9ac148", "d436fdbd4f9b556fef0a4cb654ab6ed2bae533091a9c87951a0d23af7e5df6e1", [{0xd2, 0x1000, {0x3, 0x100}}, {0x7ff, 0x40, {0x1}}, {0xaa, 0x7f, {0x1, 0xffffbf3b}}, {0x7ff, 0x7}, {0x9, 0x4, {0x2, 0x6}}, {0x9, 0xcb, {0x1, 0xfd}}, {0x2, 0x5, {0x3, 0x37}}, {0x5, 0x5, {0x3, 0x5}}, {0xdb, 0x530, {0x0, 0x4}}, {0x4, 0x9, {0x3, 0x6}}, {0x3f, 0x8d, {0x0, 0x3ff}}, {0x6, 0x1, {0x3, 0x815}}, {0x3, 0x1, {0x1, 0x9}}, {0x7ff, 0x401, {0x2, 0x8}}, {0x9, 0x51b5, {0x2, 0x401}}, {0x1000, 0x4, {0x2, 0x9}}, {0x0, 0xf6, {0x2, 0x58}}, {0x7, 0x1ff, {0x0, 0x7}}, {0x0, 0x0, {0x2, 0x1}}, {0x3, 0x6, {0x3, 0xffffffff}}, {0x9, 0x5, {0x1, 0x1}}, {0x401, 0x3, {0x1, 0xa4}}, {0x8, 0x800, {0x1, 0x800}}, {0x8, 0x200, {0x3, 0x800}}, {0x40, 0x0, {0x3}}, {0x80, 0xffff, {0x2, 0x6}}, {0xfffd, 0x258, {0x1, 0x2a653c40}}, {0xff01, 0x8, {0x2, 0xffffffff}}, {0x140, 0x1, {0x2, 0x1000}}, {0x0, 0x9, {0x1}}, {0x631, 0x3, {0x0, 0x80}}, {0x9ef, 0x2, {0x1, 0x8001}}, {0x101, 0x80, {0x3, 0x7}}, {0x20, 0x5, {0x0, 0x2}}, {0x0, 0x2, {0x1, 0x4}}, {0x0, 0x3ff, {0x1, 0x1}}, {0x3ff, 0xd1a2, {0x1, 0x6}}, {0x1, 0xfffe, {0x3, 0x7}}, {0x2, 0x7, {0x1, 0x4}}, {0x3e, 0x2, {0x3, 0x7}}]}}}, {{0x254, 0x1, {{0x6af2415892cfd19a}, 0x3, 0xc4, 0x3, 0x3, 0xffff, 'syz1\x00', "798cc0770257296dce68a162e0e3da1c5c252f0235d68ce6fc40e6750e55ed70", "a5649357ed1385d1a1a196e49e2087fbfde00cbd58c6325e631ed75b50c0e9d6", [{0xfffd, 0x0, {0x3, 0x3ff}}, {0x7, 0x3f, {0x3, 0xbbb4}}, {0x1, 0x7, {0x1, 0x1ff}}, {0x0, 0x2, {0x3, 0x5}}, {0xa58, 0x9, {0x1, 0x20}}, {0x7cc, 0x0, {0x2, 0x98}}, {0x2, 0x8000, {0x0, 0xffffffff}}, {0xd0, 0x5, {0x2, 0x100}}, {0x9, 0x401, {0x2, 0x9}}, {0x7, 0x1, {0x3, 0x4d}}, {0x4, 0x4, {0x3, 0xad6}}, {0x8000, 0x4, {0x2, 0x5}}, {0x400, 0x4, {0x1, 0x3}}, {0x8001, 0x7, {0x0, 0x2}}, {0x6, 0x7427, {0x3, 0x7}}, {0x5, 0xc, {0x2, 0x8}}, {0x3ff, 0x401, {0x0, 0x4}}, {0xb917, 0x31ad, {0x2, 0x3}}, {0xb9, 0x0, {0x3, 0x3}}, {0x5, 0xfff, {0x3, 0x9}}, {0x3, 0xed86, {0x0, 0x400}}, {0x4, 0x1, {0x3, 0x4}}, {0xed0, 0x749, {0xcb3e9fe447fe9c7, 0x3}}, {0x2, 0x800, {0x1, 0x2}}, {0x8ee0, 0x9, {0x1, 0x8}}, {0x20be, 0x3, {0x0, 0x1}}, {0x6, 0x6, {0x2, 0x21d0}}, {0x1000, 0x5, {0x2, 0xa37}}, {0x7, 0x0, {0x1}}, {0x6, 0x40, {0x1, 0x81}}, {0x5, 0x4, {0x1, 0xf5e}}, {0x4, 0x8, {0x2, 0x63}}, {0x64, 0x7, {0x3, 0xe000000}}, {0x70cf, 0x3ff, {0x2, 0x64}}, {0x1, 0x3, {0x1, 0x2}}, {0x9, 0x8, {0x0, 0x5}}, {0xffff, 0xf4, {0x1, 0x2}}, {0x0, 0x0, {0x2, 0x8}}, {0x1000, 0x9, {0x5c94565f30dde5f4}}, {0x344, 0x5ab, {0x3, 0x3}}]}}}, {{0x254, 0x1, {{0x2, 0x27}, 0x3, 0x2, 0xff, 0xff, 0x23, 'syz0\x00', "61a844ad58aa34130fe2452fdbb79c70212f73bcf8ad6a602dac1537636eecb5", "f0f4975f4a8f3adf296cfafc0d609105f8c2aaf60a3b135c5a06961380b64519", [{0x3, 0x8001, {0x2, 0x8}}, {0x400, 0x7ff}, {0x6, 0x9, {0x0, 0xffffffff}}, {0x34, 0x40, {0x2, 0x2}}, {0x2, 0x8bb}, {0x5, 0x1ff, {0x1, 0xfff}}, {0x8, 0x2, {0x2, 0xe52}}, {0x1200, 0x0, {0x2, 0xfffffb18}}, {0x7fff, 0x7, {0x2, 0x4}}, {0x7, 0xffe0, {0x1, 0x20}}, {0x8, 0x4, {0x2, 0x9}}, {0xed5d, 0xfc00, {0x0, 0x1}}, {0xff, 0x5, {0x1, 0x5}}, {0x7fff, 0xfc00, {0x1, 0x1}}, {0x6, 0x4, {0x0, 0x49}}, {0x4000, 0x80, {0x1, 0x7}}, {0xfc2f, 0x9, {0x1}}, {0xd20, 0x40}, {0xffff, 0x80, {0x2}}, {0x5, 0x1f, {0x1, 0x8}}, {0xfffa, 0x1, {0x0, 0x8}}, {0x7fff, 0xe59, {0x3, 0x5}}, {0x81, 0x7fff, {0x0, 0x6}}, {0x9, 0x6, {0x3, 0x2}}, {0x1, 0x9, {0x1, 0x6}}, {0x519, 0x81, {0x3, 0x3}}, {0x7f, 0xe3, {0x2, 0xfffffff8}}, {0x2447, 0xb44d, {0x1, 0x8}}, {0x6198, 0x81, {0x2}}, {0x3ff, 0x2, {0x3, 0xfffffffb}}, {0x46a, 0x6, {0x2, 0x1}}, {0xf5, 0x9, {0x0, 0x3}}, {0x0, 0x7, {0x3, 0xd98}}, {0x80, 0x31, {0x1, 0x1ff}}, {0xa1f, 0x5, {0x2, 0x7fffffff}}, {0x0, 0x20, {0x0, 0x30}}, {0x753d, 0x1000, {0x0, 0x4a}}, {0x0, 0x4, {0x2, 0x5}}, {0x401, 0x1, {0x3, 0x8001}}, {0x7ff, 0x3, {0x0, 0x1ff}}]}}}]}, 0x964}, 0x1, 0x0, 0x0, 0x8c1}, 0x4000090) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c0000002c00270d000000000000000004000000", @ANYRES32, @ANYBLOB="0000000000000000ffff0000080001"], 0x4c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000000)) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:34 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:34 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20040844}, 0x40000041) socket(0x10, 0x80002, 0x0) 17:36:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x15) r1 = socket$inet_dccp(0x2, 0x6, 0x0) socket$packet(0x11, 0x2, 0x300) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000000c0)={0x5, 0x1, 0x36}, 0xc) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)={0x9, 0x0, 0x1388, 0x20, 0x1f, 0xff, 0x1}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r2}}]}) 17:36:34 executing program 2: r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYRES64=r1, @ANYBLOB="54d01c47f885cf31495e55caa6d2506e28ab11e685675eeae872d9dc9d319507c2484c8acd725e5374b9922c86f9809277f97038bd298b412fc4b4cedf178d9846f25fe8e717cbcf71b26ed8616f7eafef8f4487c2473647557a1fc5453f3b9e71a72273c035e771ffd48319c05acb28922400c6e6e2"]) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$SOUND_PCM_READ_RATE(r3, 0x80045002, &(0x7f0000000000)) 17:36:34 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20040844}, 0x40000041) socket(0x10, 0x80002, 0x0) 17:36:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1173.589208] hfs: gid requires an argument [ 1173.595664] hfs: unable to parse mount options 17:36:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000000000)={[{@gid={'gid', 0x3d, r1}}, {@type={'type', 0x3d, "5ebc429f"}}]}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'syz_tun\x00', {0x1}, 0x5}) 17:36:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:35 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20040844}, 0x40000041) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1173.824656] hfs: unable to parse mount options [ 1173.896769] hfs: gid requires an argument [ 1173.907430] hfs: unable to parse mount options 17:36:35 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20040844}, 0x40000041) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:35 executing program 4: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="ff4b"]) 17:36:35 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x20040844}, 0x40000041) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000000)) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='gd=', @ANYRESHEX=0x0, @ANYBLOB=',\x00']) [ 1174.368564] hfs: unable to parse mount options 17:36:35 executing program 2: r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYRES64=r1, @ANYBLOB="54d01c47f885cf31495e55caa6d2506e28ab11e685675eeae872d9dc9d319507c2484c8acd725e5374b9922c86f9809277f97038bd298b412fc4b4cedf178d9846f25fe8e717cbcf71b26ed8616f7eafef8f4487c2473647557a1fc5453f3b9e71a72273c035e771ffd48319c05acb28922400c6e6e2"]) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$SOUND_PCM_READ_RATE(r3, 0x80045002, &(0x7f0000000000)) 17:36:35 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c00d065ed0a00000000000072905546ab2b1eb41aa816fae545b1dacd3855182af6439698852018cd5908654d07"]) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000000)=0x1) [ 1174.537743] hfs: unable to parse mount options 17:36:36 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1174.594568] hfs: can't find a HFS filesystem on dev loop4 17:36:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}, {@gid={'gid', 0x3d, r1}}]}) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r2, 0x9) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 17:36:36 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0034c9aa63ac4f1d115769159ee9a7afab19cf59310a7a49512b024b25e5cda92196f9f444dfc59eb9011c16675954f9ff"]) [ 1174.763875] hfs: unable to parse mount options [ 1174.878994] hfs: can't find a HFS filesystem on dev loop3 17:36:36 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1175.148179] hfs: gid requires an argument 17:36:36 executing program 3: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1175.206977] hfs: unable to parse mount options 17:36:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000200)='net/llc/socket\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f00000000c0)={0xed, ""/237}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 17:36:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:36 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) socket$inet6(0xa, 0x80006, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:37 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000002c0)={r7, 0x8000, 0x20, 0x8000, 0xffffffff}, &(0x7f0000000300)=0x18) getsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000000000)=""/233, &(0x7f0000000100)=0xe9) 17:36:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='giX=', @ANYRESDEC=r2, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) [ 1175.904479] hfs: can't find a HFS filesystem on dev loop3 17:36:37 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:37 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000002c0)={r7, 0x8000, 0x20, 0x8000, 0xffffffff}, &(0x7f0000000300)=0x18) getsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000000000)=""/233, &(0x7f0000000100)=0xe9) [ 1176.301039] hfs: unable to parse mount options 17:36:37 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) socket$inet6(0xa, 0x80006, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:37 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1176.336789] hfs: can't find a HFS filesystem on dev loop3 17:36:37 executing program 2: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) socket$inet6(0xa, 0x80006, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:38 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:38 executing program 4: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100002, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0xa, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_DATA={0x3c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast2}}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz2\x00'}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private=0xa010102}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000080}, 0x20004810) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c0000002c00270d000000000000000004000000", @ANYRES32, @ANYBLOB="0000000000000000ffff0000080001"], 0x4c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r3, 0x20, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x8, 0x2, 0x3}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40004) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:38 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r0, 0x9) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:38 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x400000, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) 17:36:38 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000002c0)={r7, 0x8000, 0x20, 0x8000, 0xffffffff}, &(0x7f0000000300)=0x18) getsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000000000)=""/233, &(0x7f0000000100)=0xe9) 17:36:38 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:38 executing program 4: ioctl$CHAR_RAW_FLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)=0xfffffffffffffff9) r0 = socket$netlink(0x10, 0x3, 0xf) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="67c965083f1d6dc269643dc7df9869244e992bbf2ed3be8b1d6246b52b8b96cc84b707e4ef4342f6d6ee049b8b3847256d15c9c3d98799b173ecd23f59101b9adf80254b3cf3b6116e616ea543a138c622897904917eef673a5eb31649fac91440d4e0a19664ff0a2aac4fc8d7b8f9b1de6594e46f6e00000000000000d495aed65cad4f296f1ffc58b754942316fef2b6", @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000080)=0x1, 0x4) uselib(&(0x7f0000000100)='./file0\x00') accept$inet(r2, &(0x7f0000000000), &(0x7f0000000040)=0x10) [ 1177.168960] hfs: can't find a HFS filesystem on dev loop2 17:36:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x400005, 0x0, 0x0, 0x10000000001}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000100)={@any, 0x3, 0x1, 0x3ff, 0xd5, 0x0, "bc3918e641e1df3aa857c73a6fbad753a21344c208c407d9f55440493ccf340fc888ec15c648b152aa2be0cb4e2d491da5831080425100d7b36d0397cec8cd52cd08cf375079236d9788fafffd40dd407048cf98f5b33ef27107f8ee95231704c0ac1f451cf9ab81c32484f7aaba217b35aaf355d7ce29bc69b287d05936a94d"}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000240)={0xffffffffffffffff, r1}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1177.328314] hfs: unable to parse mount options [ 1177.338729] hfs: can't find a HFS filesystem on dev loop3 17:36:38 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:38 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x60) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r2, 0x9) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x44000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0x9, 0x2, 0x2, 0x6, 0x4}, 0x20) setsockopt$inet6_udp_int(r2, 0x11, 0xa, &(0x7f0000000000)=0xb3, 0x4) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) [ 1177.570199] hfs: invalid gid -1 [ 1177.589805] hfs: unable to parse mount options 17:36:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:39 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x60) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r2, 0x9) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x44000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0x9, 0x2, 0x2, 0x6, 0x4}, 0x20) setsockopt$inet6_udp_int(r2, 0x11, 0xa, &(0x7f0000000000)=0xb3, 0x4) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) 17:36:39 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x60) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r2, 0x9) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x44000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0x9, 0x2, 0x2, 0x6, 0x4}, 0x20) setsockopt$inet6_udp_int(r2, 0x11, 0xa, &(0x7f0000000000)=0xb3, 0x4) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) 17:36:39 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x4a840, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) listen(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="2c0101d735636ab68f4ff93d", @ANYRESHEX=r2, @ANYBLOB=',\x00']) [ 1177.764452] hfs: invalid gid -1 17:36:39 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r1, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1177.787896] hfs: unable to parse mount options [ 1177.801423] hfs: invalid gid -1 [ 1177.817511] hfs: unable to parse mount options [ 1177.847683] hfs: unable to parse mount options 17:36:39 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x60) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r2, 0x9) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x44000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0x9, 0x2, 0x2, 0x6, 0x4}, 0x20) setsockopt$inet6_udp_int(r2, 0x11, 0xa, &(0x7f0000000000)=0xb3, 0x4) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) 17:36:39 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000002c0)={r7, 0x8000, 0x20, 0x8000, 0xffffffff}, &(0x7f0000000300)=0x18) 17:36:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, r6, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:39 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r1, 0x9) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x1c, 0x80800) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@gid={'gid', 0x3d, r3}}], [{@smackfsdef={'smackfsdef', 0x3d, '.#:\\\xf9}%]'}}]}) [ 1178.066426] hfs: invalid gid -1 [ 1178.070085] hfs: unable to parse mount options 17:36:39 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ptrace$peek(0xffffffffffffffff, r0, &(0x7f00000000c0)) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:39 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x60) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r2, 0x9) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x44000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0x9, 0x2, 0x2, 0x6, 0x4}, 0x20) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) [ 1178.200165] hfs: unable to parse mount options [ 1178.257015] hfs: can't find a HFS filesystem on dev loop3 [ 1178.452478] hfs: invalid gid -1 17:36:39 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1178.503161] hfs: unable to parse mount options 17:36:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:40 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x60) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r2, 0x9) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x44000, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) [ 1178.702535] hfs: invalid gid -1 [ 1178.715765] hfs: unable to parse mount options 17:36:40 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:40 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x60) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r2, 0x9) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) 17:36:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000006c0)={0x20, r6, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:40 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) 17:36:40 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1179.017131] hfs: invalid gid -1 [ 1179.037224] hfs: unable to parse mount options 17:36:40 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x60) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) [ 1179.215979] hfs: invalid gid -1 [ 1179.225213] hfs: can't find a HFS filesystem on dev loop3 17:36:40 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1179.437104] hfs: unable to parse mount options 17:36:40 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:40 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x60) socket$inet6(0xa, 0x40000080806, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) 17:36:41 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1179.672495] hfs: invalid gid -1 [ 1179.677365] hfs: unable to parse mount options 17:36:41 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x60) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) [ 1179.856330] hfs: invalid gid -1 [ 1179.861554] hfs: unable to parse mount options 17:36:41 executing program 4: socket$netlink(0x10, 0x3, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX, @ANYBLOB="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"]) 17:36:41 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000002c0)={r7, 0x8000, 0x20, 0x8000, 0xffffffff}, &(0x7f0000000300)=0x18) 17:36:41 executing program 1 (fault-call:4 fault-nth:0): r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:41 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 17:36:41 executing program 5: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1180.070528] hfs: invalid gid -1 [ 1180.083081] hfs: can't find a HFS filesystem on dev loop3 [ 1180.092861] hfs: unable to parse mount options [ 1180.102474] FAULT_INJECTION: forcing a failure. [ 1180.102474] name failslab, interval 1, probability 0, space 0, times 0 [ 1180.147476] CPU: 0 PID: 11012 Comm: syz-executor.1 Not tainted 4.14.189-syzkaller #0 [ 1180.157542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.170287] Call Trace: [ 1180.173931] dump_stack+0x1b2/0x283 [ 1180.178254] should_fail.cold+0x10a/0x154 [ 1180.183458] should_failslab+0xd6/0x130 [ 1180.188290] kmem_cache_alloc_node+0x263/0x410 [ 1180.193669] __alloc_skb+0x5c/0x510 [ 1180.197671] netlink_sendmsg+0x901/0xb80 [ 1180.204258] ? nlmsg_notify+0x170/0x170 [ 1180.209341] ? kernel_recvmsg+0x210/0x210 [ 1180.216124] ? security_socket_sendmsg+0x83/0xb0 [ 1180.222948] ? nlmsg_notify+0x170/0x170 [ 1180.229072] sock_sendmsg+0xb5/0x100 [ 1180.233024] ___sys_sendmsg+0x6c8/0x800 [ 1180.238803] ? get_pid_task+0x91/0x130 [ 1180.244222] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 1180.249644] ? lock_downgrade+0x740/0x740 [ 1180.254889] ? __fget+0x1fe/0x360 [ 1180.259502] ? lock_acquire+0x170/0x3f0 [ 1180.263943] ? lock_downgrade+0x740/0x740 [ 1180.270795] ? __fget+0x225/0x360 [ 1180.275378] ? __fdget+0x196/0x1f0 [ 1180.279402] ? sockfd_lookup_light+0xb2/0x160 [ 1180.285360] __sys_sendmsg+0xa3/0x120 [ 1180.289897] ? SyS_shutdown+0x160/0x160 [ 1180.297499] ? wait_for_completion_io+0x10/0x10 [ 1180.305049] ? SyS_read+0x210/0x210 [ 1180.311235] ? SyS_clock_settime+0x1a0/0x1a0 [ 1180.319827] SyS_sendmsg+0x27/0x40 [ 1180.326167] ? __sys_sendmsg+0x120/0x120 [ 1180.333293] do_syscall_64+0x1d5/0x640 [ 1180.338614] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1180.348772] RIP: 0033:0x45c1f9 [ 1180.354923] RSP: 002b:00007fcc876dfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1180.366075] RAX: ffffffffffffffda RBX: 000000000002b5c0 RCX: 000000000045c1f9 [ 1180.376029] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 1180.386129] RBP: 00007fcc876dfca0 R08: 0000000000000000 R09: 0000000000000000 17:36:41 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1180.395389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1180.405219] R13: 00007ffc7945b69f R14: 00007fcc876e09c0 R15: 000000000078bf0c 17:36:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1180.443573] hfs: can't find a HFS filesystem on dev loop2 17:36:41 executing program 4: socket$netlink(0x10, 0x3, 0x0) syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX, @ANYBLOB="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"]) 17:36:42 executing program 1 (fault-call:4 fault-nth:1): r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:42 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1180.665594] hfs: invalid gid -1 [ 1180.676824] hfs: unable to parse mount options [ 1180.795525] FAULT_INJECTION: forcing a failure. [ 1180.795525] name failslab, interval 1, probability 0, space 0, times 0 [ 1180.816610] CPU: 0 PID: 11044 Comm: syz-executor.1 Not tainted 4.14.189-syzkaller #0 [ 1180.830358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.846243] Call Trace: [ 1180.850075] dump_stack+0x1b2/0x283 [ 1180.855688] should_fail.cold+0x10a/0x154 [ 1180.863210] should_failslab+0xd6/0x130 [ 1180.871769] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1180.882834] __kmalloc_node_track_caller+0x38/0x70 [ 1180.892079] __alloc_skb+0x96/0x510 [ 1180.898206] netlink_sendmsg+0x901/0xb80 [ 1180.905609] ? nlmsg_notify+0x170/0x170 [ 1180.912095] ? nlmsg_notify+0x170/0x170 [ 1180.919723] sock_sendmsg+0xb5/0x100 [ 1180.929175] ___sys_sendmsg+0x6c8/0x800 [ 1180.936175] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 1180.944532] ? lock_downgrade+0x740/0x740 [ 1180.956085] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 1180.964850] ? __fget+0x1fe/0x360 [ 1180.970885] ? lock_downgrade+0x740/0x740 [ 1180.979507] ? __fget+0x225/0x360 [ 1180.985545] ? __fdget+0x196/0x1f0 [ 1180.991723] ? sockfd_lookup_light+0xb2/0x160 [ 1180.999826] __sys_sendmsg+0xa3/0x120 [ 1181.008202] ? SyS_shutdown+0x160/0x160 [ 1181.014945] ? wait_for_completion_io+0x10/0x10 [ 1181.022803] ? SyS_read+0x210/0x210 [ 1181.031935] ? SyS_clock_settime+0x1a0/0x1a0 17:36:42 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000002c0)={r7, 0x8000, 0x20, 0x8000, 0xffffffff}, &(0x7f0000000300)=0x18) [ 1181.043223] SyS_sendmsg+0x27/0x40 [ 1181.050345] ? __sys_sendmsg+0x120/0x120 [ 1181.058381] do_syscall_64+0x1d5/0x640 [ 1181.067453] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1181.076697] RIP: 0033:0x45c1f9 [ 1181.082860] RSP: 002b:00007fcc876dfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1181.097819] RAX: ffffffffffffffda RBX: 000000000002b5c0 RCX: 000000000045c1f9 [ 1181.108800] hfs: can't find a HFS filesystem on dev loop2 [ 1181.110850] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 1181.110856] RBP: 00007fcc876dfca0 R08: 0000000000000000 R09: 0000000000000000 17:36:42 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX, @ANYBLOB="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"]) 17:36:42 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x1, 0x84) [ 1181.110865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1181.110871] R13: 00007ffc7945b69f R14: 00007fcc876e09c0 R15: 000000000078bf0c 17:36:42 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1181.348053] hfs: invalid gid -1 17:36:42 executing program 1 (fault-call:4 fault-nth:2): r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1181.439027] hfs: unable to parse mount options [ 1181.474279] hfs: can't find a HFS filesystem on dev loop3 17:36:43 executing program 5: gettid() process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:43 executing program 4: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX, @ANYBLOB="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"]) [ 1181.690612] FAULT_INJECTION: forcing a failure. [ 1181.690612] name failslab, interval 1, probability 0, space 0, times 0 [ 1181.777805] CPU: 0 PID: 11090 Comm: syz-executor.1 Not tainted 4.14.189-syzkaller #0 [ 1181.794444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.811611] Call Trace: [ 1181.816292] dump_stack+0x1b2/0x283 17:36:43 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000002c0)={r7, 0x8000, 0x20, 0x8000, 0xffffffff}, &(0x7f0000000300)=0x18) [ 1181.825621] should_fail.cold+0x10a/0x154 [ 1181.834332] should_failslab+0xd6/0x130 [ 1181.842619] kmem_cache_alloc+0x40/0x3c0 [ 1181.853865] skb_clone+0x126/0x9a0 [ 1181.861778] netlink_deliver_tap+0x655/0x7d0 [ 1181.868756] netlink_unicast+0x485/0x610 [ 1181.876907] ? netlink_sendskb+0xd0/0xd0 [ 1181.883140] netlink_sendmsg+0x62e/0xb80 [ 1181.891336] ? nlmsg_notify+0x170/0x170 [ 1181.897902] ? kernel_recvmsg+0x210/0x210 [ 1181.905511] ? security_socket_sendmsg+0x83/0xb0 [ 1181.917898] ? nlmsg_notify+0x170/0x170 [ 1181.928655] sock_sendmsg+0xb5/0x100 [ 1181.940658] ___sys_sendmsg+0x6c8/0x800 [ 1181.950892] ? get_pid_task+0x91/0x130 [ 1181.963115] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 1181.972813] ? lock_downgrade+0x740/0x740 [ 1181.984614] ? __fget+0x1fe/0x360 [ 1181.993642] ? lock_acquire+0x170/0x3f0 [ 1182.001944] ? lock_downgrade+0x740/0x740 [ 1182.013153] ? __fget+0x225/0x360 [ 1182.020892] ? __fdget+0x196/0x1f0 [ 1182.027814] ? sockfd_lookup_light+0xb2/0x160 [ 1182.035754] __sys_sendmsg+0xa3/0x120 [ 1182.044238] ? SyS_shutdown+0x160/0x160 [ 1182.050866] ? wait_for_completion_io+0x10/0x10 [ 1182.062114] ? SyS_read+0x210/0x210 [ 1182.070081] ? SyS_clock_settime+0x1a0/0x1a0 [ 1182.078331] SyS_sendmsg+0x27/0x40 [ 1182.086441] ? __sys_sendmsg+0x120/0x120 [ 1182.096297] do_syscall_64+0x1d5/0x640 [ 1182.103837] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1182.116016] RIP: 0033:0x45c1f9 [ 1182.122456] RSP: 002b:00007fcc876dfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1182.141634] RAX: ffffffffffffffda RBX: 000000000002b5c0 RCX: 000000000045c1f9 [ 1182.158131] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 17:36:43 executing program 5: gettid() process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1182.175919] RBP: 00007fcc876dfca0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.193696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1182.212089] R13: 00007ffc7945b69f R14: 00007fcc876e09c0 R15: 000000000078bf0c 17:36:43 executing program 4: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX, @ANYBLOB="2c00c6bb21e1d8c3408d7318c2e5ce9668ca1000c77ff3446df7e1a5feccfe58c1619afc79c9ebbd087315618f0c15826a6af6cbc90417ca26c9ef5bffb2b038912fa4817da3fee786fbb55ac38ca3ade2df0b24bcf091ff8a1d00901e37c25df51502e4f636c237a9845bb0df0baf9e925505a863e872e5f257321bdf46c0584dac9a7035c65e16cad8e23b9e1fece0ffd222087b24f48629570603465d0db1c6290652f3247efa8e5519201a4c9ba462df12733985dae43964b006e62e9d05f448efa0c5dd6679e6421e077d8c9144570d1ce879b90aec2f657427079c1eff4c135d58c60f44412da3d25da4115d242ff8c283f088beac2fb2f15e1b843344baa80a4e0c39404c79123bf6c526"]) 17:36:43 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) 17:36:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:43 executing program 1 (fault-call:4 fault-nth:3): r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:43 executing program 5: gettid() process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:43 executing program 4: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX, @ANYBLOB="2c00c6bb21e1d8c3408d7318c2e5ce9668ca1000c77ff3446df7e1a5feccfe58c1619afc79c9ebbd087315618f0c15826a6af6cbc90417ca26c9ef5bffb2b038912fa4817da3fee786fbb55ac38ca3ade2df0b24bcf091ff8a1d00901e37c25df51502e4f636c237a9845bb0df0baf9e925505a863e872e5f257321bdf46c0584dac9a7035c65e16cad8e23b9e1fece0ffd222087b24f48629570603465d0db1c6290652f3247efa8e5519201a4c9ba462df12733985dae43964b006e62e9d05f448efa0c5dd6679e6421e077d8c9144570d1ce879b90aec2f657427079c1eff4c135d58c60f44412da3d25da4115d242ff8c283f088beac2fb2f15e1b843344baa80a4e0c39404c79123bf6c526"]) [ 1182.421726] FAULT_INJECTION: forcing a failure. [ 1182.421726] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.449473] hfs: can't find a HFS filesystem on dev loop2 [ 1182.487424] hfs: can't find a HFS filesystem on dev loop3 17:36:43 executing program 5: r0 = gettid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1182.738213] CPU: 0 PID: 11121 Comm: syz-executor.1 Not tainted 4.14.189-syzkaller #0 [ 1182.752665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.772330] Call Trace: [ 1182.778508] dump_stack+0x1b2/0x283 17:36:44 executing program 5: r0 = gettid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1182.785253] should_fail.cold+0x10a/0x154 [ 1182.793181] should_failslab+0xd6/0x130 [ 1182.800249] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1182.809324] __kmalloc_node+0x38/0x70 [ 1182.819173] qdisc_alloc+0xa1/0x550 [ 1182.828911] qdisc_create+0xa8/0xda0 [ 1182.835782] ? validate_nla+0x192/0x5e0 [ 1182.842633] ? qdisc_tree_reduce_backlog+0x4d0/0x4d0 [ 1182.853840] ? nla_parse+0x157/0x1f0 [ 1182.859683] tc_modify_qdisc+0x466/0x1250 [ 1182.868045] ? tc_get_qdisc+0x7f0/0x7f0 [ 1182.874407] ? tc_get_qdisc+0x7f0/0x7f0 [ 1182.882072] rtnetlink_rcv_msg+0x3be/0xb10 [ 1182.890705] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 1182.900182] ? __netlink_lookup+0x345/0x5d0 [ 1182.907767] ? netdev_pick_tx+0x2e0/0x2e0 [ 1182.917006] netlink_rcv_skb+0x125/0x390 [ 1182.924917] ? memcpy+0x35/0x50 [ 1182.930291] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 1182.938318] ? netlink_ack+0x9a0/0x9a0 [ 1182.945084] netlink_unicast+0x437/0x610 [ 1182.951869] ? netlink_sendskb+0xd0/0xd0 [ 1182.957251] netlink_sendmsg+0x62e/0xb80 [ 1182.963532] ? nlmsg_notify+0x170/0x170 [ 1182.969646] ? kernel_recvmsg+0x210/0x210 [ 1182.977010] ? security_socket_sendmsg+0x83/0xb0 [ 1182.986666] ? nlmsg_notify+0x170/0x170 [ 1182.993662] sock_sendmsg+0xb5/0x100 [ 1183.000543] ___sys_sendmsg+0x6c8/0x800 [ 1183.007828] ? get_pid_task+0x91/0x130 [ 1183.015253] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 1183.028222] ? lock_downgrade+0x740/0x740 [ 1183.036483] ? __fget+0x1fe/0x360 [ 1183.043617] ? lock_acquire+0x170/0x3f0 [ 1183.051422] ? lock_downgrade+0x740/0x740 [ 1183.059092] ? __fget+0x225/0x360 [ 1183.068236] ? __fdget+0x196/0x1f0 [ 1183.075175] ? sockfd_lookup_light+0xb2/0x160 [ 1183.081105] __sys_sendmsg+0xa3/0x120 [ 1183.087574] ? SyS_shutdown+0x160/0x160 [ 1183.095614] ? wait_for_completion_io+0x10/0x10 [ 1183.104157] ? SyS_read+0x210/0x210 [ 1183.111254] ? SyS_clock_settime+0x1a0/0x1a0 [ 1183.120763] SyS_sendmsg+0x27/0x40 [ 1183.128420] ? __sys_sendmsg+0x120/0x120 [ 1183.135029] do_syscall_64+0x1d5/0x640 [ 1183.140797] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1183.151686] RIP: 0033:0x45c1f9 [ 1183.157494] RSP: 002b:00007fcc876dfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1183.170312] RAX: ffffffffffffffda RBX: 000000000002b5c0 RCX: 000000000045c1f9 [ 1183.181339] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 1183.194413] RBP: 00007fcc876dfca0 R08: 0000000000000000 R09: 0000000000000000 [ 1183.206626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1183.221857] R13: 00007ffc7945b69f R14: 00007fcc876e09c0 R15: 000000000078bf0c 17:36:44 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) 17:36:44 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX, @ANYBLOB="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"]) 17:36:44 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) 17:36:44 executing program 5: r0 = gettid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:44 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX, @ANYBLOB="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"]) [ 1183.463562] hfs: can't find a HFS filesystem on dev loop2 17:36:44 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:45 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:45 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r1, 0x4140, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = dup(0xffffffffffffffff) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=ANY=[@ANYBLOB="6505000024000b0f00000000000000001f000000", @ANYRES32=r2, @ANYBLOB="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"], 0x148}}, 0x0) 17:36:45 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX, @ANYBLOB="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"]) 17:36:45 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:45 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1183.774860] hfs: can't find a HFS filesystem on dev loop3 17:36:45 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x7e) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040)={{0x6, 0x2e}, 0x62}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=ANY=[@ANYBLOB="4801000034000b0f000000000e00000000000001", @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) 17:36:45 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) [ 1184.263174] hfs: can't find a HFS filesystem on dev loop2 17:36:45 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{0x0}], 0x1, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:45 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:45 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) 17:36:45 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) 17:36:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:46 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:36:46 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{0x0}], 0x1, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:46 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{0x0}], 0x1, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1184.729314] hfs: can't find a HFS filesystem on dev loop3 17:36:46 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:46 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:46 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x1, 0x84) 17:36:46 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1185.131681] hfs: invalid gid -1 [ 1185.136766] hfs: can't find a HFS filesystem on dev loop2 [ 1185.163247] hfs: unable to parse mount options 17:36:46 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=']) [ 1185.345305] hfs: unable to parse mount options 17:36:46 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:46 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=']) 17:36:46 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 17:36:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:47 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xf7}], 0x1, &(0x7f0000000180), 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1185.687587] hfs: unable to parse mount options [ 1185.706611] hfs: can't find a HFS filesystem on dev loop3 17:36:47 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=']) 17:36:47 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) 17:36:47 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r2 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0xa00000, 0x1, 0x1000, r2, 0x0, &(0x7f0000000040)={0x990a7d, 0x8001, [], @value=0x5}}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000240)={r6}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r6, 0x1}, &(0x7f00000001c0)=0x8) preadv(r1, &(0x7f00000017c0), 0x375, 0x0) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="4801000052fe37e5000000000000000000e1ff00", @ANYRES32=r7, @ANYBLOB="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"], 0x148}}, 0x0) [ 1185.949133] hfs: unable to parse mount options 17:36:47 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYRESHEX]) 17:36:47 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xf7}], 0x1, &(0x7f0000000180), 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1186.054576] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65106 sclass=netlink_route_socket pid=11330 comm=syz-executor.1 [ 1186.093078] hfs: can't find a HFS filesystem on dev loop2 [ 1186.164883] hfs: unable to parse mount options 17:36:47 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYRESHEX]) 17:36:47 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xf7}], 0x1, &(0x7f0000000180), 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1186.311631] hfs: unable to parse mount options 17:36:47 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYRESHEX]) 17:36:47 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 1186.485284] hfs: unable to parse mount options 17:36:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:47 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xf7}], 0x1, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:47 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB, @ANYRESHEX]) [ 1186.634142] hfs: can't find a HFS filesystem on dev loop3 [ 1186.728238] hfs: unable to parse mount options 17:36:48 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) 17:36:48 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB, @ANYRESHEX]) 17:36:48 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) sendto$rose(r3, &(0x7f0000000100)="21a191c6ae829a0260802d54ceab4a77523461f497d80ed9a2f36878f3dc5bdc2ae2452c75e88d069015e676884f8b8fe399e2e179b263bd0d9991e8f93359f0917bbaf5cd7ee6779d095b16f4fe5e6a5dcd825fede8534d9de62568e72f238ed4185e175f5462facba4ae7f4e67b373b42c8275f7a52d5acdafb139aa82acac61f7bb86d3ad38127a04624b3ec6cbbe3d3a4f87d59cf77972ae8f9db8255d1552593f", 0xa3, 0x20000000, &(0x7f00000001c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x1, [@null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) r4 = socket$inet6(0xa, 0x40000080806, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f00000007c0)) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r4, 0x9) sync_file_range(r4, 0x9, 0xda5, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1187.004838] hfs: can't find a HFS filesystem on dev loop2 17:36:48 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xf7}], 0x1, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1187.091998] hfs: unable to parse mount options 17:36:48 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB, @ANYRESHEX]) 17:36:48 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x4c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x20, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_MAX_P={0x8, 0x3, 0xfffffff7}]}}]}, 0x4c}}, 0x0) 17:36:48 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1187.363549] hfs: unable to parse mount options 17:36:48 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gi', @ANYRESHEX]) 17:36:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1187.564327] hfs: can't find a HFS filesystem on dev loop3 17:36:49 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xf7}], 0x1, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1187.616697] hfs: unable to parse mount options 17:36:49 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gi', @ANYRESHEX]) 17:36:49 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) [ 1187.988246] hfs: can't find a HFS filesystem on dev loop2 [ 1187.988634] hfs: unable to parse mount options 17:36:49 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280)='ethtool\x00') sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="cafadb2ed77cf55c79977fbadb523f976a8db1657d5aeb9638c6f9ff53b58fec4d98843cf198d3b8c498f14b7bdcb387991f9eaf7db7ca034a0b8306ece12d319b8fd9f4641e83a34e924fe02635b5c865744656e3c3d3400f2fa4cd5464df3e33b2aeb2159a48171ddfb280344db9292c659ae25e36dfdf844a9b0f39bc55ff7d3a39a9d650b357966be2cc7a4164bce60fd06b84fa5abc56bf1c25f6161216f3b103c0eca0b545f05647fe16", @ANYRES16=r0, @ANYBLOB="000225bd7000fddbdf25140000000800040000000080"], 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x20000040) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_newroute={0x24, 0x18, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_OIF={0x8, 0x4, r3}]}, 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_newroute={0x24, 0x18, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_OIF={0x8, 0x4, r6}]}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x101}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x8c, r0, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40085}, 0x20048800) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x84383, 0x0) setsockopt$inet6_tcp_TLS_RX(r9, 0x6, 0x2, &(0x7f0000000100)=@gcm_128={{0x304}, "9f0fd8bc1ed010b2", "eb4cd857373e9dc315b482361c83d013", "eedaf2c3", "c803de3b34c3661b"}, 0x28) r10 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:36:49 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gi', @ANYRESHEX]) 17:36:49 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1188.212041] hfs: unable to parse mount options 17:36:49 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid', @ANYRESHEX]) 17:36:49 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:49 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1188.403900] hfs: unable to parse mount options [ 1188.468003] hfs: can't find a HFS filesystem on dev loop3 17:36:49 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid', @ANYRESHEX]) 17:36:50 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000480)) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x42c}, 0x1, 0x0, 0x0, 0xc000}, 0x4000041) socket(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'wg2\x00', 0x8}) syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x3ff, 0x8000) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x42200, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x30, r5, 0x1, 0x0, 0x0, {0x1a}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_RULES={0x14}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r5, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x88101) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0) ioctl$NS_GET_OWNER_UID(r6, 0xb704, &(0x7f0000000540)) 17:36:50 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1188.745448] hfs: unable to parse mount options 17:36:50 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 17:36:50 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid', @ANYRESHEX]) 17:36:50 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x220400, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup=r1, r2, 0x1e, 0x6, r3}, 0x14) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000040)={'syztnl2\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x20, 0x7, 0x75, @dev={0xfe, 0x80, [], 0x11}, @private2, 0x10, 0x7, 0xff, 0x3}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_newroute={0x24, 0x18, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_OIF={0x8, 0x4, r7}]}, 0x24}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@getchain={0x6c, 0x66, 0x20, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0xffff, 0x8}, {0xfff2, 0x4}, {0x9, 0x4}}, [{0x8, 0xb, 0x1}, {0x8, 0xb, 0x9}, {0x8}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0x3}, {0x8, 0xb, 0xfffffacd}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x7fff}, {0x8, 0xb, 0x4}]}, 0x6c}}, 0x48004) 17:36:50 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1188.995132] hfs: unable to parse mount options [ 1189.016656] hfs: can't find a HFS filesystem on dev loop2 17:36:50 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYBLOB=',gid=', @ANYRESHEX]) [ 1189.086001] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pid=11536 comm=syz-executor.1 17:36:50 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1189.217857] hfs: unable to parse mount options 17:36:50 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:50 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYBLOB=',gid=', @ANYRESHEX]) [ 1189.331809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pid=11552 comm=syz-executor.1 [ 1189.394687] hfs: unable to parse mount options [ 1189.419983] hfs: can't find a HFS filesystem on dev loop3 17:36:50 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:50 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) socket(0x10, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:50 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0) r5 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000740)) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000280)='team0\x00') r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newqdisc={0x164, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0x9}, {0x10, 0xe}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x8000}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8bb}, @TCA_STAB={0x128, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x2, 0x0, 0x87f, 0x1, 0x0, 0x8, 0x9173}}, {0x4}}, {{0x1c, 0x1, {0x1f, 0xff, 0x2, 0x7, 0x2, 0x0, 0x7, 0x1}}, {0x6, 0x2, [0x401]}}, {{0x1c, 0x1, {0x0, 0x15, 0x1f, 0x8, 0x0, 0x8000, 0x8, 0x1}}, {0x6, 0x2, [0x6c00]}}, {{0x1c, 0x1, {0xad, 0x6, 0x40, 0x4, 0x0, 0x6, 0x795a, 0x2}}, {0x8, 0x2, [0x1ff, 0x5]}}, {{0x1c, 0x1, {0x6, 0xa7, 0x100, 0xba8, 0x2, 0x0, 0x3b187e26, 0x4}}, {0xc, 0x2, [0x20, 0x1ff, 0xc, 0x5]}}, {{0x1c, 0x1, {0x0, 0x9, 0x800, 0x400, 0x2, 0x1, 0x5, 0x1}}, {0x6, 0x2, [0x9]}}, {{0x1c, 0x1, {0xda, 0x40, 0x6, 0x2, 0x2, 0x0, 0xffffffff, 0x3}}, {0xa, 0x2, [0x0, 0x7, 0xfff7]}}, {{0x1c, 0x1, {0x4, 0x5, 0x4, 0x4, 0x1, 0x7ff, 0x1000, 0x1}}, {0x6, 0x2, [0x100]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x3ee6}]}, 0x164}}, 0x40080) r7 = openat$mice(0xffffffffffffff9c, &(0x7f0000000500)='/dev/input/mice\x00', 0xc02) r8 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r8, &(0x7f00000017c0), 0x375, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r8, 0x4142, 0x0) setsockopt$inet6_dccp_int(r7, 0x21, 0x1, &(0x7f0000000540)=0x7ff, 0x4) [ 1189.601023] hfs: unable to parse mount options 17:36:51 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:51 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) socket(0x10, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:51 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:51 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) socket(0x10, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) [ 1189.879984] hfs: can't find a HFS filesystem on dev loop2 [ 1189.933198] hfs: unable to parse mount options 17:36:51 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:51 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 17:36:51 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:51 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) [ 1190.166476] hfs: unable to parse mount options 17:36:51 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) [ 1190.310838] hfs: unable to parse mount options [ 1190.327094] hfs: can't find a HFS filesystem on dev loop3 17:36:51 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid', @ANYRESHEX]) [ 1190.475447] hfs: unable to parse mount options 17:36:52 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=ANY=[@ANYBLOB="4801000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) 17:36:52 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:52 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xf7}], 0x1, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x27a4eaa51029717, 0x0) 17:36:52 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1190.826624] hfs: can't find a HFS filesystem on dev loop2 [ 1190.844396] hfs: unable to parse mount options 17:36:52 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:52 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1191.055434] hfs: unable to parse mount options 17:36:52 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:52 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 1191.220240] hfs: can't find a HFS filesystem on dev loop3 [ 1191.260146] hfs: unable to parse mount options [ 1191.304619] hfs: can't find a HFS filesystem on dev loop5 17:36:52 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:52 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) r9 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000240)={r10}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={r7, 0x6, 0x0, 0xfffd, 0x2, 0x3, 0x1, 0x371d301d, {r10, @in6={{0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}, 0x101, 0x401, 0xff, 0x21f1, 0x1}}, &(0x7f00000001c0)=0xb0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={r11}, &(0x7f0000000380)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={r11, 0x3ff, 0x30}, 0xc) [ 1191.419052] hfs: unable to parse mount options 17:36:52 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:52 executing program 1: r0 = socket(0x11, 0x2, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x80000) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x3, 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000000100)={&(0x7f0000000040)=[0x80000000, 0xbed, 0x80000001, 0x25d3e4cf, 0x0, 0xdc5, 0x2, 0x8001, 0x9], 0x9, 0x81, 0x9, 0x10001, 0x4, 0x1, 0x4, {0x2, 0x2, 0x3, 0x81, 0xab0, 0x1ff, 0x40, 0x3ff, 0x7ff, 0x4, 0x2, 0x1, 0x5, 0x6, "4de33b1fa227ee503f01b01a4af4be975e87dfdde9f4220025bef3cff6a77bf0"}}) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=ANY=[@ANYBLOB="4801000024000bf2ffffffffffffff0000000000", @ANYRES32=r2, @ANYBLOB="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"], 0x148}}, 0x0) [ 1191.544108] hfs: unable to parse mount options 17:36:53 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:53 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gi', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:53 executing program 1: r0 = socket(0x11, 0x3, 0x9) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1191.711333] hfs: unable to parse mount options [ 1191.719819] hfs: can't find a HFS filesystem on dev loop2 17:36:53 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) [ 1191.874735] hfs: unable to parse mount options 17:36:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:53 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) 17:36:53 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000007c0)={"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"}) 17:36:53 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:53 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1192.066745] hfs: unable to parse mount options 17:36:53 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX]) [ 1192.141925] hfs: can't find a HFS filesystem on dev loop3 [ 1192.196465] hfs: unable to parse mount options 17:36:53 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=ANY=[@ANYBLOB="480100e50024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) [ 1192.231436] hfs: can't find a HFS filesystem on dev loop5 17:36:53 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 1192.422162] hfs: can't find a HFS filesystem on dev loop4 17:36:53 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:53 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=ANY=[@ANYBLOB="48e6ffff230000000000000000400000", @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) [ 1192.582213] hfs: can't find a HFS filesystem on dev loop2 17:36:54 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) sendmsg$NFT_MSG_GETTABLE(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x1, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004042}, 0x40) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x300, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0xfffffffc}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x811}, 0x4004040) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:54 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) bind(r0, &(0x7f0000000100)=@hci={0x1f, 0x1, 0x3}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:54 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:54 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 1193.045919] hfs: can't find a HFS filesystem on dev loop3 [ 1193.054674] hfs: can't find a HFS filesystem on dev loop5 17:36:54 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 1193.243018] hfs: can't find a HFS filesystem on dev loop4 17:36:54 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1193.430065] hfs: can't find a HFS filesystem on dev loop2 17:36:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:55 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:55 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 1193.898638] hfs: can't find a HFS filesystem on dev loop3 17:36:55 executing program 1: r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000180)=0xc) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0) r5 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r5, 0x9) ioctl$FITHAW(r5, 0xc0045878) openat(r4, &(0x7f0000000040)='./file0\x00', 0x601, 0x31) 17:36:55 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1193.977345] hfs: can't find a HFS filesystem on dev loop5 17:36:55 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 1194.105849] hfs: can't find a HFS filesystem on dev loop3 17:36:55 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1194.158954] 9pnet: Insufficient options for proto=fd [ 1194.183100] hfs: can't find a HFS filesystem on dev loop4 17:36:55 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1194.348290] hfs: can't find a HFS filesystem on dev loop3 [ 1194.372145] hfs: can't find a HFS filesystem on dev loop2 17:36:55 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1194.399832] 9pnet: Insufficient options for proto=fd 17:36:55 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1194.479272] hfs: can't find a HFS filesystem on dev loop3 [ 1194.495034] 9pnet: Insufficient options for proto=fd [ 1194.624080] hfs: can't find a HFS filesystem on dev loop3 17:36:56 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1194.674192] 9pnet: Insufficient options for proto=fd 17:36:56 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYRESHEX]) 17:36:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1194.840270] hfs: unable to parse mount options [ 1194.865282] hfs: can't find a HFS filesystem on dev loop3 17:36:56 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB="4801000024000b0f000000000000000000000000c8ac939aec0da3c294b8ec7aff6b", @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) [ 1194.912291] 9pnet: Insufficient options for proto=fd 17:36:56 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:56 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1194.978241] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1195.046231] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1195.076901] hfs: can't find a HFS filesystem on dev loop4 [ 1195.086009] hfs: can't find a HFS filesystem on dev loop3 17:36:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:56 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1195.169207] 9pnet: Insufficient options for proto=fd 17:36:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1195.318131] hfs: can't find a HFS filesystem on dev loop2 17:36:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:56 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280)='ethtool\x00') sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="cafadb2ed77cf55c79977fbadb523f976a8db1657d5aeb9638c6f9ff53b58fec4d98843cf198d3b8c498f14b7bdcb387991f9eaf7db7ca034a0b8306ece12d319b8fd9f4641e83a34e924fe02635b5c865744656e3c3d3400f2fa4cd5464df3e33b2aeb2159a48171ddfb280344db9292c659ae25e36dfdf844a9b0f39bc55ff7d3a39a9d650b357966be2cc7a4164bce60fd06b84fa5abc56bf1c25f6161216f3b103c0eca0b545f05647fe16", @ANYRES16=r1, @ANYBLOB="000225bd7000fddbdf25140000000800040000000080"], 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x20000040) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfe}, 0x14}}, 0x24000024) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:57 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='batadv0\x00'}) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioperm(0x2, 0x100, 0x0) r2 = socket(0x10, 0x3, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x2) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000180)=0x2, 0x4) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0x10}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x20000000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000040)={'syztnl2\x00', &(0x7f0000000100)={'syztnl0\x00', r1, 0x29, 0x80, 0x5, 0x2, 0x2, @empty, @private2={0xfc, 0x2, [], 0x1}, 0x8000, 0x80, 0x8, 0x1}}) 17:36:57 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:57 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:57 executing program 3: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1196.012259] hfs: can't find a HFS filesystem on dev loop4 17:36:57 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:57 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r3 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x20, r3, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x9, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:36:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:57 executing program 3: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:57 executing program 1: r0 = socket(0x11, 0x2, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1196.307488] hfs: can't find a HFS filesystem on dev loop2 17:36:57 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:57 executing program 3: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:57 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:58 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000340)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r1, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x757488e9b71b70c8) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r4 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000180)={0x0, 0xd5c, 0x8001, 0x7, 0x0, 0x7, 0x8, 0x4, {0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x4, 0x1c32b98f, 0x8, 0x8, 0x7f}}, &(0x7f0000000240)=0xb0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r6, 0x118, 0x0, &(0x7f00000002c0)=0x9, 0x4) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000280)={r5, 0x1, 0x7, 0x3f}, 0x10) r7 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCADDRT(r7, 0x890b, &(0x7f0000000100)={0x0, @ethernet={0x6, @multicast}, @generic={0x9, "56eba544f7b4abc8ba7249a0b916"}, @sco={0x1f, @fixed={[], 0x10}}, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='erspan0\x00', 0x0, 0x10001, 0x939}) sendmsg$nl_route_sched(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="4801000024000b0f00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100726564001c010200140001000200000000000000000000000000000004010200f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802ccf267e64e9b23d593f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c68147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"], 0x148}}, 0x0) [ 1196.587411] hfs: can't find a HFS filesystem on dev loop2 17:36:58 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:58 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:58 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:58 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1196.809417] hfs: can't find a HFS filesystem on dev loop2 [ 1196.823924] hfs: can't find a HFS filesystem on dev loop5 17:36:58 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1196.861188] hfs: can't find a HFS filesystem on dev loop4 [ 1196.877450] 9pnet: Insufficient options for proto=fd [ 1196.976334] hfs: can't find a HFS filesystem on dev loop2 [ 1196.996995] 9pnet: Insufficient options for proto=fd 17:36:58 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:58 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r4}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:58 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1197.193429] 9pnet: Insufficient options for proto=fd [ 1197.202020] hfs: can't find a HFS filesystem on dev loop2 [ 1197.217018] 9pnet: Insufficient options for proto=fd 17:36:58 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1197.344601] 9pnet: Insufficient options for proto=fd [ 1197.367329] hfs: can't find a HFS filesystem on dev loop2 17:36:58 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1197.419261] 9pnet: Insufficient options for proto=fd 17:36:59 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x5, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="4801000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(0xffffffffffffffff, 0x80084121, &(0x7f0000000040)) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0x6b1e) 17:36:59 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1197.575488] 9pnet: Insufficient options for proto=fd 17:36:59 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:59 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:59 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1197.677430] hfs: can't find a HFS filesystem on dev loop2 [ 1197.714407] hfs: can't find a HFS filesystem on dev loop5 17:36:59 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1043080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x1000c000}, 0x4000) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) [ 1197.795184] hfs: can't find a HFS filesystem on dev loop4 [ 1197.796172] 9pnet: Insufficient options for proto=fd [ 1197.893980] 9pnet: Insufficient options for proto=fd 17:36:59 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r4}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:36:59 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000001c0)=@req={0xbc97, 0x7219, 0x80, 0x6}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0xfa, 0x0, 0x40, "db95963024b4cb3f2a2b053d96473d51", "b0c81a5e3b916b6dbff5737633ae0a6b9e97a972754e274552c7bda88546e502074c4967f7e63e73a3b16f08cf5f3a66d263953734d44ae5640173fd731304053ea2707da4ad83ae7af12785e7da69d14ffdae5b15959896ca64b8d8dd4ad18145368c56913fb5e1a4ec50e9b614069fe874db80d7cf3c5282ae8215d2945f49592561b3e60c0f4bc8afd0380bf0b30e5c09d34475b06eac791b8762e8b00f3f861ed51d8b4d7a729bcd461375993f4a298ed4ac59a7c7011f98e7ddffbb8381b24ab60e18ce4fd16a5ba1c632ecf0df1cafa3c74ec79861a88d43fccfd697fdb5edfc5800"}, 0xfa, 0x2) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/190, 0xbe) [ 1198.106039] 9pnet: Insufficient options for proto=fd 17:36:59 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:59 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="48010f000000000000000000000000100ee4af1e3e2c80f38b6b40c5de04124f80c61d4ee933eee52de16f9d041c4f48c5a953497ca88a8999dc4a5b7b0df743134c6878f1756606d5c59f4e7aa2bc18dc8d7493adea24", @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) 17:36:59 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:59 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:59 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:59 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:59 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:36:59 executing program 1: bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000140)={0x0, 0x80000000, 0x401, &(0x7f0000000100)=0x7}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0xfffffffd, 0x0, {0x0, 0x0, 0x0, r0, {}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x1002, 0x8000000, 0x0, 0x0, 0x15, 0x1}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:37:00 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1198.631698] QAT: Invalid ioctl [ 1198.651997] hfs: can't find a HFS filesystem on dev loop2 [ 1198.665138] hfs: can't find a HFS filesystem on dev loop5 [ 1198.669929] QAT: Invalid ioctl [ 1198.687464] hfs: can't find a HFS filesystem on dev loop4 17:37:00 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'ip6_vti0\x00', 0x600}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) [ 1198.738069] 9pnet: Insufficient options for proto=fd [ 1198.807815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64804 sclass=netlink_route_socket pid=12311 comm=syz-executor.1 17:37:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r4}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:37:00 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1198.923313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64804 sclass=netlink_route_socket pid=12311 comm=syz-executor.1 17:37:00 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000100)={0x7, 0x20, 0x6, 0x8, 0x3, 0x2b}) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x4020) 17:37:00 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, 0x0) 17:37:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r1, 0x9) r2 = dup2(0xffffffffffffffff, r1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000001c0)) getpeername$tipc(r0, &(0x7f0000000100)=@name, &(0x7f0000000180)=0x10) r3 = socket(0x11, 0x2, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, &(0x7f0000000140)={0x4}) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x7}, {0xffff, 0xffff}, {0x0, 0x3}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x10) 17:37:00 executing program 2: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:00 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1199.412680] hfs: can't find a HFS filesystem on dev loop2 17:37:00 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:00 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, 0x0) 17:37:00 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) setsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000100)=0x1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_newroute={0x24, 0x18, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_OIF={0x8, 0x4, r4}]}, 0x24}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r5, &(0x7f00000017c0), 0x375, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@delchain={0x34, 0x65, 0x300, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0x6, 0xffe0}, {0xffff, 0x2}, {0xb, 0x2}}, [@TCA_RATE={0x6, 0x5, {0x3f, 0x1f}}, @TCA_CHAIN={0x8, 0xb, 0x1000}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000880}, 0x0) [ 1199.522128] 9pnet: Insufficient options for proto=fd 17:37:01 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, 0x0) [ 1199.602079] hfs: can't find a HFS filesystem on dev loop4 [ 1199.611603] hfs: can't find a HFS filesystem on dev loop5 17:37:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:37:01 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = semget$private(0x0, 0x0, 0x8) semtimedop(r1, &(0x7f0000000000)=[{0x7, 0x8, 0x800}, {0x4, 0x5, 0x1800}, {0x0, 0x80, 0x800}, {0x0, 0x6, 0x800}, {0x0, 0x101, 0x1000}, {0x1, 0x4}, {0x3, 0xfffa, 0x800}, {0x4, 0x401, 0x800}], 0x8, &(0x7f0000000100)) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x10, 0x3, 0x0) syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x1, 0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=ANY=[@ANYBLOB="4801000024000b0f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x148}}, 0x0) 17:37:01 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r0 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:01 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000100)=0x4) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000180)=0x8) ioctl$USBDEVFS_REAPURBNDELAY(r2, 0x4008550d, &(0x7f0000000140)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1199.993126] 9pnet: Insufficient options for proto=fd 17:37:01 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r0 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:01 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast2}, @NLBL_MGMT_A_CV4DOI={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x44004}, 0x800) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={r4}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001980)={r4, 0x9, "50b80761542ae67931"}, &(0x7f00000019c0)=0x11) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) recvmsg$kcm(r5, &(0x7f0000001940)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f0000000640)=""/164, 0xa4}, {&(0x7f0000000700)=""/14, 0xe}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/197, 0xc5}], 0x5, &(0x7f0000000740)=""/14, 0xe}, 0x40000001) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="480100002400000400"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) [ 1200.179915] 9pnet: Insufficient options for proto=fd 17:37:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:01 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:01 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:01 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r0 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:01 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x10c00, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000100)={'team_slave_0\x00', 0x6}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=ANY=[@ANYBLOB="4801000024000b0f00ffffff0501000000000000", @ANYRES32=r2, @ANYBLOB="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"], 0x148}}, 0x0) [ 1200.415147] 9pnet: Insufficient options for proto=fd 17:37:01 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1200.478075] hfs: can't find a HFS filesystem on dev loop4 [ 1200.508002] hfs: can't find a HFS filesystem on dev loop5 17:37:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:37:02 executing program 1: chdir(&(0x7f0000000040)='./file0\x00') r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1200.628401] 9pnet: Insufficient options for proto=fd 17:37:02 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:02 executing program 1: r0 = socket(0x2c, 0x2, 0xffffffff) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1200.804910] 9pnet: Insufficient options for proto=fd 17:37:02 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:02 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) accept$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1201.019897] 9pnet: Insufficient options for proto=fd 17:37:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:02 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:02 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:37:02 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:02 executing program 1: r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000040)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) [ 1201.276619] hfs: can't find a HFS filesystem on dev loop4 17:37:02 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:02 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1201.435391] hfs: can't find a HFS filesystem on dev loop5 [ 1201.496164] hfs: can't find a HFS filesystem on dev loop4 17:37:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:37:03 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:03 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1201.747155] hfs: can't find a HFS filesystem on dev loop4 17:37:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:03 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1202.055583] hfs: can't find a HFS filesystem on dev loop4 [ 1202.105191] 9pnet: Insufficient options for proto=fd 17:37:03 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:03 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}]}}) 17:37:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:37:03 executing program 1: r0 = socket(0x11, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x8200, 0x0) write$P9_RSTATFS(r3, &(0x7f0000000140)={0x43, 0x9, 0x2, {0x6, 0x82, 0x5, 0x7, 0x2, 0x7, 0x81, 0x100000001, 0x8}}, 0x43) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) r4 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f00000001c0)='gretap0\x00') 17:37:03 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:03 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, 'gid'}}]}}) [ 1202.329008] hfs: can't find a HFS filesystem on dev loop5 [ 1202.360865] hfs: can't find a HFS filesystem on dev loop4 [ 1202.378068] 9pnet: Insufficient options for proto=fd 17:37:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:37:03 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:03 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 17:37:04 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1202.645981] hfs: can't find a HFS filesystem on dev loop4 [ 1202.704740] 9pnet: Insufficient options for proto=fd [ 1202.737770] hfs: can't find a HFS filesystem on dev loop3 17:37:04 executing program 2: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:04 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1202.912642] hfs: can't find a HFS filesystem on dev loop4 [ 1203.019529] 9pnet: Insufficient options for proto=fd 17:37:04 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1203.158681] hfs: can't find a HFS filesystem on dev loop5 17:37:04 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2, 0x0, 0x0, 0x0, 0x17}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:37:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:37:04 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="3926f1cefacb4684b53d6f48a134314801000024000b0f00"/35, @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x84) 17:37:04 executing program 3: r0 = socket(0x11, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x8200, 0x0) write$P9_RSTATFS(r3, &(0x7f0000000140)={0x43, 0x9, 0x2, {0x6, 0x82, 0x5, 0x7, 0x2, 0x7, 0x81, 0x100000001, 0x8}}, 0x43) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) r4 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f00000001c0)='gretap0\x00') 17:37:04 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) ioctl$SOUND_PCM_READ_RATE(r2, 0x80045002, &(0x7f0000000040)) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000001800010300000000000000007efd2ee7000000080000000008100400", @ANYRES32=r5, @ANYBLOB], 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=@delchain={0x219c, 0x65, 0x100, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x1, 0x1}, {0x8, 0x7}, {0x2}}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x2160, 0x2, [@TCA_FW_INDEV={0x14, 0x3, 'veth1_to_batadv\x00'}, @TCA_FW_CLASSID={0x8, 0x1, {0xc, 0xffff}}, @TCA_FW_INDEV={0x14, 0x3, 'macvlan1\x00'}, @TCA_FW_ACT={0x211c, 0x4, [@m_xt={0x1100, 0x1b, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x1048, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TARG={0x102a, 0x6, {0x1ff, 'mangle\x00', 0x0, 0x5, "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"}}, @TCA_IPT_INDEX={0x8, 0x3, 0x6}, @TCA_IPT_INDEX={0x8, 0x3, 0x1000}]}, {0x91, 0x6, "6066c631046862d54288b57164a124ed56fd1a834f58b67fbd7c130eace584dcead04bca0ccd14b2b0ea9dcced2228c0f71bcca780c0d971e74710353748f2f12fad2c4242a70195c3bf7891446750f52e96fc51929a959a1e202c0eba53ce1b5144b81a7b76522ff00db8bfe90f0dbc7572858ac29b6efd42485854c5a9d5c663af2878798c860cb6b7c849d5"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x6}}}}, @m_vlan={0xa8, 0x0, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x4}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0xffffffff, 0x7, 0x10000000, 0x5, 0x2}, 0x3}}]}, {0x58, 0x6, "da447dbd103a1f8b56565a9a293354f512c6cf72b992ca6d66b7ccfb596b7bd333c0c97f38d0a53d35355c6b744cdb6d7d4c91b49ed8c92e94c61b3b19c51b6b206f155a3e267824c4b720917efea868d355acc7"}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_police={0x92c, 0x6, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x88c, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0xff, 0x2, 0x4, 0x7, 0x8, 0x3, 0x9, 0x2, 0x1, 0x40, 0x2, 0x6, 0x2, 0x10001, 0x1000, 0x30c6, 0x9, 0xfff, 0x7, 0x9, 0x9, 0x6a3f, 0x2, 0x5, 0xfffffffb, 0x80000001, 0x5, 0x5, 0x78, 0x3, 0x9, 0xffffffff, 0xff, 0x46, 0x2, 0x4, 0x6, 0x1, 0x9, 0x9, 0x0, 0x8, 0x10000, 0x9, 0x3ff, 0x7fff, 0x6, 0x0, 0xfffffff9, 0x3, 0xe, 0x0, 0x1ff, 0x1, 0x0, 0xa3, 0xfffffd3e, 0x73, 0x10001, 0x5, 0x8b, 0x1f, 0x8, 0x1, 0x1983, 0x1, 0x3, 0x74, 0x5, 0x9, 0xe84a380, 0x4, 0x2, 0x7fffffff, 0x3, 0x9, 0x8000, 0x0, 0x1f, 0x5, 0x7, 0x8, 0x3, 0x3, 0x7, 0x0, 0xd0, 0x3, 0x9, 0xc7, 0x1, 0x8, 0x3, 0x2e, 0x7fffffff, 0x5, 0x10001, 0x4, 0x9, 0xfffffff7, 0x8, 0x1f, 0x9, 0x0, 0x9, 0xff, 0x2, 0x0, 0x7, 0x5, 0xec5, 0x0, 0x8, 0x9, 0x0, 0x3, 0x5, 0x2, 0x400, 0x6, 0x3ff, 0x9f, 0x7fff, 0x9, 0x1, 0x679, 0x7c000, 0x6a5d, 0x7fff, 0xe77e0000, 0x7, 0x8, 0x2, 0x4, 0x7, 0x6, 0x80, 0xfffff001, 0x7, 0x3f, 0x8, 0xfffff800, 0x7ff, 0x400, 0x80000001, 0x4b7, 0x9, 0x517c, 0x2, 0xffffffff, 0x20, 0x9, 0x0, 0x3f, 0x2, 0xfff, 0x7ff, 0xc8000000, 0x1, 0x0, 0x0, 0x4, 0x238, 0x8, 0x1000, 0x8, 0x80, 0x66c1, 0xf6, 0x7, 0x7, 0xfffffffa, 0x0, 0x400, 0x3ff, 0x5a34, 0x8000, 0x8, 0xffffff7f, 0x10000, 0x8, 0x8000, 0x5, 0x400, 0x2, 0x3, 0x8, 0x1, 0x9, 0x8000, 0xfc4, 0x3f, 0x111b, 0xc7, 0x1, 0xfffffffd, 0x6, 0x800, 0xfffffff9, 0x0, 0x5, 0xffffffff, 0x100, 0x10001, 0x7, 0x0, 0xfffffffc, 0xffffffff, 0x3ff, 0xfff, 0x10001, 0xfffffe01, 0x2800000, 0x7fffffff, 0x5, 0xd2a, 0x5, 0x401, 0x0, 0x8000000, 0x1e, 0x1, 0x0, 0x23f73d50, 0xa754, 0x6, 0x1, 0x9, 0x5, 0x6, 0x5dc, 0x4, 0x9, 0x100, 0x0, 0xb2f, 0x4, 0x40, 0x4, 0x5c4, 0x8, 0x0, 0x100, 0x92c7, 0x4, 0x8001, 0x33b, 0xfffff65d, 0x7, 0x3ff, 0x8, 0x4, 0x8, 0x8000, 0x1d819eb0, 0x9]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x4}, @TCA_POLICE_TBF={0x3c, 0x1, {0xffff39de, 0x4, 0x2, 0x9, 0x3, {0x1f, 0x2, 0x0, 0x54, 0x7fff, 0x3}, {0xd1, 0x1, 0x7, 0x7, 0x400, 0x80000001}, 0x1000, 0x5, 0x7}}, @TCA_POLICE_RATE={0x404, 0x2, [0x7f, 0x401, 0xe99, 0x800, 0x7, 0x2, 0x20, 0xfffffffe, 0x87b9, 0x13a0, 0x4, 0x1e, 0x1, 0x80000000, 0x7fff, 0x8, 0x6, 0x52de, 0x1, 0x4, 0x7, 0xf444, 0x6, 0x9, 0x0, 0x80000000, 0x0, 0x5, 0x800, 0x0, 0x9b, 0x1, 0x3, 0x0, 0x5, 0x3d4d, 0x80000000, 0x1f, 0x80, 0x80000000, 0x1, 0x5, 0x2, 0x7fffffff, 0x4, 0xfffff000, 0x7fff, 0x1, 0x6, 0x9, 0xfffffffd, 0x4, 0x2, 0x4, 0x80000001, 0x6, 0x3, 0x3, 0x100, 0x7, 0x9, 0xbed, 0x8594, 0x9, 0x1ff, 0x148, 0x3, 0xfffffffd, 0x3, 0x4, 0x3c7, 0x4, 0x40, 0x1, 0xf3, 0xffff0001, 0x7, 0xff, 0x0, 0x1, 0x874, 0x7ff, 0x3, 0x400, 0x3ff, 0x4, 0x42, 0x9, 0x40, 0x85c5, 0x6, 0x9, 0x9, 0x7, 0x6, 0x200, 0x0, 0x3, 0x400, 0x4, 0x219f, 0x3, 0x1, 0x4, 0x4, 0x6, 0x3, 0x4c, 0x8, 0x9, 0x100, 0x0, 0x2, 0x2e2, 0x8, 0x7, 0x1, 0x8, 0x4, 0x40000, 0x2, 0x0, 0x0, 0xfffffffd, 0x7ff, 0x510, 0x1b, 0x1c000, 0x8001, 0x100, 0x3, 0x101, 0x5, 0x5, 0x7, 0x0, 0x1, 0x5, 0x81, 0x1, 0x5, 0x7, 0x4, 0x4, 0x7c7, 0x6, 0x8, 0x2, 0x0, 0x3, 0x3, 0x5, 0xfffffffc, 0x800, 0x6, 0x80000000, 0xfff, 0x0, 0x0, 0x4, 0x7fffffff, 0x3, 0x401, 0x1, 0x8, 0x3, 0x6, 0x1, 0x2, 0x8, 0xa0b, 0x1, 0x1ff, 0x0, 0x80000000, 0x5, 0x8, 0x0, 0x7fff, 0x2, 0x20000, 0x3f, 0x2, 0x1, 0x593a, 0x1, 0x1, 0x80, 0x0, 0x1, 0x200, 0x0, 0x7d53e1f9, 0x1, 0x8, 0x0, 0xffff, 0x3, 0x8, 0x7b2099ed, 0x6, 0x908a, 0x5a24, 0x4, 0x7ff, 0x9, 0x5, 0xb59, 0x4, 0x4, 0x10001, 0x81, 0x80, 0x1, 0xce0, 0x10001, 0x7ff, 0x3, 0x400, 0x3ff, 0x20, 0x4, 0x9, 0x4, 0x0, 0x8001, 0x1716, 0x8, 0x6, 0x6, 0x401, 0x22, 0x8, 0x78, 0x6, 0x5, 0xaf1, 0x1, 0x2, 0xa8b5, 0x10001, 0x2, 0x5, 0x0, 0x7ff, 0x8554, 0x6, 0x4, 0x80000001, 0xfff, 0x0, 0x100, 0x6822, 0x7b1d, 0xff78, 0xfffffffe]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x40, 0x4, 0x3, 0x5, 0x9, {0x1, 0x2, 0x1f, 0x2, 0x3ff, 0x7fffffff}, {0xfc, 0x0, 0x3ff, 0x100, 0x6, 0x3}, 0x0, 0x0, 0x9}}]]}, {0x78, 0x6, "684ed5e5c9ed1c03ad2263267ad1e5d3234fe33cf3859f8d38ff53b7b6a1531e2f1ea8a24e4afda86336cf0157f44d2d4ddcfa6ebdcb3bf8a680bd16704bacd43f5d18b6e13d0fba88128c99430de03ae77a787cf15c4055fd8f9e5b696e0b99292d35af67d2ba3ecab13a9a8c69101e26f4b395"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}, @m_sample={0xb0, 0x1b, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PARMS={0x18, 0x2, {0x4, 0x1, 0xffffffffffffffff, 0x3}}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x6}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x80000000}]}, {0x54, 0x6, "f7836155c51262266708e1b1ffa4810a32cf8afeb2a4e69a4869dc8f124d26fb92bdfd2e1687a8eda32256eecb71bef7b921d1af9bbb883c34c732debb171150cc6cef306e72d348362aa0a4e59aa5c6"}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_connmark={0x178, 0xc, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x11c, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1a737d65, 0xa2d, 0x6, 0x800, 0x2}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x46000000, 0xffff, 0x5, 0x7, 0x2}, 0x20}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0xfff, 0x10000000, 0x7, 0xb73}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfff, 0x1ff, 0x6, 0x10000, 0x76}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x80, 0x100, 0x3, 0x100, 0x2}, 0x32e3}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffff8, 0x4, 0x6, 0x5}, 0xffa1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4000, 0x3, 0x2, 0x5, 0x1}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xebb, 0x7f, 0x10000000, 0x20, 0x7}, 0x3255}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffffd, 0x6, 0x20000000, 0x200, 0xfffffff8}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffffe, 0x0, 0x0, 0x10001, 0x7}, 0x5}}]}, {0x2e, 0x6, "618afbf1df33de29c4b37f079f324d0da4e18623ea214d86356bd4d72a1b2a34b25b9c46e75e03450d78"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}, @m_bpf={0x78, 0x1f, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8, 0x5, r0}]}, {0x48, 0x6, "922cc822b9bd88f09d2b525fb5adfcff7978bfd90fb77e35bb2e743fed0b9c44ce95781f9ac5b559705c0eaf49da537cdf4a815da3d84dd3fe5531665fa57427b8d57ba5"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}, @m_tunnel_key={0x118, 0x13, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x48, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private1={0xfc, 0x1, [], 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @private2={0xfc, 0x2, [], 0x1}}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0xc8, 0x9, 0xffffffffffffffff, 0x35, 0x200}, 0x2}}]}, {0xa3, 0x6, "da46d7c6f67155e5722f9ca404ac5ae58458299b78c40d61f29a633d1670cfdb813a0883f8be323f6b28d9a07437d75e6b1e13bc35985a03facd79ac0ef01b3574de3f36dd2138c500d00a0937f78e8759b50169086d8774a36bead4929bceab6bdfa4a36086d340a763c22c0ebe7fbcaf559f11694ae8dff00f6a9d60bd0cdc0b769d65377708416724e46ce5429cdd7705cbee8ba7ad507798f3a45afed1"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_mpls={0x124, 0x18, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x4, 0x34, 0x5, 0x1, 0x5}, 0x2}}, @TCA_MPLS_TC={0x5, 0x6, 0x4}, @TCA_MPLS_TTL={0x5, 0x7, 0x1f}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x80000000, 0x7b1c, 0x20000000, 0x100, 0x5}, 0x3}}, @TCA_MPLS_BOS={0x5}]}, {0xa5, 0x6, "585eff8dbc128c0c9c2aeb353eea532bce401404af16e6a6cff8177b05d9a87379294c2af65a25c5509968cb49d048fa8f9e30f2f7feceb1413ee14bedb1117c0955abbcd84374b2d5d1d4bdb59d6807edda41d995d5dcb09509c4bcc614bb5a7cbc2bc494baad96c742f782d42c9da02c945762b1acc13442f0e313e7c0e0a5d7e687f1fc0934e95fc3c45855ea920c9a637380639c009dcba80d1650c6685d9c"}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_connmark={0x168, 0x1b, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x90, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0xffff, 0x5, 0x9, 0x7f}, 0x1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0x348d, 0x4, 0xfffff001, 0x7f}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x81, 0xfca, 0x1, 0x3, 0x3}, 0xfa4}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x10001, 0x0, 0x4, 0x7, 0x7}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7f, 0x1f, 0x0, 0x3, 0x4}, 0x3f}}]}, {0xaa, 0x6, "c0ac9a8bb243ac8d44d0f39ceb1b754bbe69044b9c0e4330a99af1c709126651ff2710ed7735bf4c68152252875d0d7fa39aa184baf8ca413f8a3da2aac993b928aff05b1102cd2bff34e9117ea84d1988e529f6d1cb55c97796288339313f924f794f4ef311d19575cede31c1164cfc6ed161c5d4591830fa769deae1133505c1cd0a1c56b7462c89fc7027d114640bea94dca20318ab924fddbea495e3248cca198783bbc6"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}]}, @TCA_FW_POLICE={0x10, 0x2, [@TCA_POLICE_RATE64={0xc, 0x8, 0x9}]}]}}, @TCA_CHAIN={0x8, 0xb, 0xc56}, @TCA_CHAIN={0x8, 0xb, 0xfffffffc}]}, 0x219c}}, 0x0) [ 1203.628033] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=101 sclass=netlink_route_socket pid=12702 comm=syz-executor.1 17:37:05 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:05 executing program 2: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1203.720869] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=101 sclass=netlink_route_socket pid=12709 comm=syz-executor.1 17:37:05 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c, 0x80000) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000500)=0x1c, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000540)='veth0_to_bridge\x00', 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ocfs2_control\x00', 0x20000, 0x0) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, &(0x7f0000000400)={0x0, 0x10, 0x0, 0x0, 0x0, [@loopback, @private2, @private0, @dev={0xfe, 0x80, [], 0x20}, @private0={0xfc, 0x0, [], 0x1}, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2]}, 0x88) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sendmsg$nl_route_sched(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=ANY=[@ANYBLOB="4801000024000b0f0000000000000000000000007a040070a641c7322402deb7206de300e54702f9b5e45440e7d404c08281f86b137dd17d00000000135e48374cfdef4d156c27decf3f20f56bd571259e01e5e112bf148ee964303f15921a13559590ad1e6228351e9ca5bf0329c3dbcc1afb0cb2d2952bf544b3741d60b8a53127c1f1d25cd2ed9869fbcddccf003293daffc7df57904ed9238602af3951c7704212c824114aebe2fde700933d6bba", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00543e0008000100726564001c010200140001000200000000000000000000000000000004010200f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008811798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"], 0x148}}, 0x0) r6 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r6, 0x9) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000000600)={'syztnl1\x00', &(0x7f0000000580)={'syztnl0\x00', r4, 0x29, 0x3, 0x7f, 0x400, 0x40, @dev={0xfe, 0x80, [], 0x3c}, @mcast1, 0x7807, 0x8000, 0x8, 0x89}}) [ 1203.855626] hfs: can't find a HFS filesystem on dev loop4 17:37:05 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1203.938721] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1203.982606] 9pnet: Insufficient options for proto=fd [ 1204.029139] hfs: can't find a HFS filesystem on dev loop5 17:37:05 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="480100893bddcf8dcf1bba3652ee520024000b0f000000000000b9aa00000000", @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) [ 1204.085747] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.1'. 17:37:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:37:05 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=ANY=[@ANYBLOB="4801000024000b0f000000000900000000c84400", @ANYRES32=r1, @ANYBLOB="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"], 0x148}}, 0x0) 17:37:05 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYRESHEX=r1, @ANYRESOCT=r1, @ANYBLOB="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"], 0x148}}, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x20200, 0x0) 17:37:05 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:05 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x15, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000140)={0x0, 0x800, 0x1000, [], &(0x7f0000000100)=0x4}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x3}, 0x8) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) [ 1204.506557] hfs: can't find a HFS filesystem on dev loop3 17:37:06 executing program 4: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:06 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) 17:37:06 executing program 2: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:06 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@remote, @private2={0xfc, 0x2, [], 0x1}, @remote, 0xff, 0x3, 0x100, 0x400, 0x0, 0x400003, r1}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) clock_gettime(0x2, &(0x7f0000000040)) [ 1204.745163] hfs: can't find a HFS filesystem on dev loop4 17:37:06 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1204.851814] 9pnet: Insufficient options for proto=fd [ 1204.877675] hfs: can't find a HFS filesystem on dev loop5 17:37:06 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1205.087082] hfs: can't find a HFS filesystem on dev loop5 17:37:06 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:06 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:06 executing program 3: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280)='ethtool\x00') sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="cafadb2ed77cf55c79977fbadb523f976a8db1657d5aeb9638c6f9ff53b58fec4d98843cf198d3b8c498f14b7bdcb387991f9eaf7db7ca034a0b8306ece12d319b8fd9f4641e83a34e924fe02635b5c865744656e3c3d3400f2fa4cd5464df3e33b2aeb2159a48171ddfb280344db9292c659ae25e36dfdf844a9b0f39bc55ff7d3a39a9d650b357966be2cc7a4164bce60fd06b84fa5abc56bf1c25f6161216f3b103c0eca0b545f05647fe16", @ANYRES16=r1, @ANYBLOB="000225bd7000fddbdf25140000000800040000000080"], 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x20000040) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x400, 0x70bd29, 0x25dfdbfe}, 0x14}}, 0x24000024) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) [ 1205.227272] hfs: can't find a HFS filesystem on dev loop5 [ 1205.412425] hfs: can't find a HFS filesystem on dev loop5 [ 1205.441685] 9pnet: Insufficient options for proto=fd 17:37:06 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:06 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1205.581900] hfs: can't find a HFS filesystem on dev loop5 17:37:07 executing program 2: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:07 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1205.632454] 9pnet: Insufficient options for proto=fd [ 1205.636474] hfs: can't find a HFS filesystem on dev loop3 [ 1205.660251] 9pnet: Insufficient options for proto=fd 17:37:07 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) [ 1205.843972] hfs: can't find a HFS filesystem on dev loop5 17:37:07 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1205.891445] 9pnet: Insufficient options for proto=fd 17:37:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1205.959025] hfs: can't find a HFS filesystem on dev loop3 [ 1206.074696] hfs: can't find a HFS filesystem on dev loop5 [ 1206.195154] 9pnet: Insufficient options for proto=fd 17:37:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:08 executing program 2: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:08 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1206.794145] hfs: can't find a HFS filesystem on dev loop3 17:37:08 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1206.875443] 9pnet: Insufficient options for proto=fd 17:37:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r5}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:37:08 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000240)={r7}, &(0x7f0000000380)=0x14) [ 1207.036379] hfs: can't find a HFS filesystem on dev loop5 [ 1207.069134] hfs: can't find a HFS filesystem on dev loop3 [ 1207.101525] 9pnet: Insufficient options for proto=fd 17:37:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:08 executing program 2: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:09 executing program 5: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1207.761208] 9pnet: Insufficient options for proto=fd 17:37:09 executing program 3: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:09 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1207.843611] hfs: can't find a HFS filesystem on dev loop5 [ 1207.941794] 9pnet: Insufficient options for proto=fd 17:37:09 executing program 4: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:09 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={r4}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000040)={r4, 0x101}, &(0x7f0000000180)=0x8) r5 = socket(0x10, 0x3, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r7, &(0x7f00000017c0), 0x375, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r7, 0xc008640a, &(0x7f00000001c0)={0x0}) r9 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r9, &(0x7f00000017c0), 0x375, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r6, 0xc00c642d, &(0x7f0000000200)={r8, 0x80000, r9}) sendmsg$nl_route_sched(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=ANY=[@ANYBLOB="4400000024000800fcffffff0000000000000000c4d2c6b03495eff5db7a200417a1fff84bc09684e4f43eec3cc8765674", @ANYRES32=r1, @ANYBLOB="00000000ffff05000000000008000100726564001800020008000300030000000c0004000800000007000000"], 0x44}}, 0x0) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x2080, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r10, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/269], 0x54}, 0x1, 0x0, 0x0, 0x4000001}, 0x10) 17:37:09 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r2, 0x29, 0x37, &(0x7f0000000040)={0x32, 0x5, [], [@calipso={0x7, 0x28, {0x3, 0x8, 0x1, 0x4, [0x6, 0x6, 0xe00000000000000, 0xb1f]}}]}, 0x38) 17:37:09 executing program 2: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:09 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x200004e20}, 0x1c) listen(r1, 0x9) r2 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) bind(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0xa99c, 0x803, 0x1, {0xa, 0x4e21, 0x2, @private1, 0x7}}}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=ANY=[@ANYBLOB="5000000024000b0f00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000180800010072650002001400000000000c0004000800100007000400"], 0x50}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r5, &(0x7f00000017c0), 0x375, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r5, 0x4040ae72, &(0x7f0000000100)={0x1, 0x2, 0x3, 0x1, 0x5}) 17:37:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:10 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1208.657583] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 17:37:10 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) [ 1208.756056] 9pnet: Insufficient options for proto=fd [ 1208.917187] hfs: can't find a HFS filesystem on dev loop3 17:37:10 executing program 4: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:10 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="4801000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x148}, 0x1, 0x0, 0x0, 0x40000}, 0x0) [ 1209.446851] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 17:37:10 executing program 2: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:10 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1209.662965] 9pnet: Insufficient options for proto=fd 17:37:11 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fc, &(0x7f0000000040)="acbf8ace1fb3cde6763d0b3bcfeffca65d33df") sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "f8ad1c9a8dd6438504f722e2e21d7d17baeb5647fdffe9a7387b776ed0c3e5923cb3d02485dafbc82c08793773d114428974a2008801798cbb2afd29e3fceb2e4f4588e8fb27802c3f96dc67b69e5a7fcc5299e76097640acef868133ce6010f937a58142d7ff69ffc032d596aad3d45db1942f24f81da853f6ee856a2bce138da12cf922aa2e1944e13be624fd37b8280b62662eaf641757e53cb342b1cc06c7f4cc99e5a8b97d37137605a7f7c382d3e350a2e3c3128e811b8943b4e13d9cfe25bf2567fefc6418cf613d568720d20527d176653ee883e9a6a9d4c85147008e7ae4f39a2ea46bad678107cad48923a325f0d5874cb28b87c78513327318cf7"}]}}]}, 0x148}}, 0x0) 17:37:11 executing program 3: syz_mount_image$hfs(&(0x7f0000000580)='hfs\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000340)={0x7, 0x0, 0x10000, 0xff}) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) r4 = openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x400000, 0x0) ioctl$CHAR_RAW_RRPART(r4, 0x125f, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) [ 1209.814848] hfs: can't find a HFS filesystem on dev loop3 17:37:11 executing program 1: r0 = socket(0x11, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x3, 0x800000003, 0x1) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_newroute={0x24, 0x18, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_OIF={0x8, 0x4, r3}]}, 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'syztnl2\x00', r3, 0x29, 0x80, 0x1f, 0x3, 0x10, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x10, 0x20, 0x80, 0x9}}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv4_getaddr={0x34, 0x16, 0xb24, 0x70bd26, 0x25dfdbff, {0x2, 0x18, 0x86, 0xc8, r4}, [@IFA_CACHEINFO={0x14, 0x6, {0x7, 0x0, 0x7, 0x40}}, @IFA_LOCAL={0x8, 0x2, @local}]}, 0x34}, 0x1, 0x0, 0x0, 0x2400c8d0}, 0x8040) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) r7 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$IP_VS_SO_GET_SERVICE(r7, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) sendmsg$nl_route_sched(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_PARMS={0x14, 0x1, {0x2}}, @TCA_RED_STAB={0x104, 0x2, "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"}]}}]}, 0x148}}, 0x0) setrlimit(0x5, &(0x7f0000000280)={0x5, 0x5}) 17:37:11 executing program 4: syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@gid={'gid'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:11 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001300)=ANY=[@ANYBLOB="4801000024000b0f00"/20, @ANYRES32=r2, @ANYBLOB="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"/304], 0x148}}, 0x0) [ 1210.222923] ================================================================== [ 1210.236480] BUG: KASAN: use-after-free in u32_destroy_key.constprop.0.isra.0+0x1a4/0x1d0 [ 1210.254739] Read of size 4 at addr ffff88804c236d98 by task kworker/u4:0/7447 [ 1210.267429] [ 1210.269373] CPU: 0 PID: 7447 Comm: kworker/u4:0 Not tainted 4.14.189-syzkaller #0 [ 1210.284508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.309343] Workqueue: tc_filter_workqueue u32_delete_key_freepf_work [ 1210.323789] Call Trace: [ 1210.327916] dump_stack+0x1b2/0x283 [ 1210.333927] print_address_description.cold+0x54/0x1d3 [ 1210.343359] kasan_report_error.cold+0x8a/0x194 [ 1210.350359] ? u32_destroy_key.constprop.0.isra.0+0x1a4/0x1d0 [ 1210.359736] __asan_report_load4_noabort+0x68/0x70 [ 1210.368904] ? u32_destroy_key.constprop.0.isra.0+0x1a4/0x1d0 [ 1210.376770] u32_destroy_key.constprop.0.isra.0+0x1a4/0x1d0 [ 1210.383731] u32_delete_key_freepf_work+0x1c/0x30 [ 1210.390739] process_one_work+0x793/0x14a0 [ 1210.397051] ? work_busy+0x320/0x320 [ 1210.401678] ? worker_thread+0x158/0xff0 [ 1210.408264] ? _raw_spin_unlock_irq+0x24/0x80 [ 1210.415015] worker_thread+0x5cc/0xff0 [ 1210.419864] ? rescuer_thread+0xc80/0xc80 [ 1210.424931] kthread+0x30d/0x420 [ 1210.429328] ? kthread_create_on_node+0xd0/0xd0 [ 1210.435750] ret_from_fork+0x24/0x30 [ 1210.440290] [ 1210.443284] Allocated by task 17199: [ 1210.447746] kasan_kmalloc+0xeb/0x160 [ 1210.451722] kmem_cache_alloc_trace+0x131/0x3d0 [ 1210.457546] u32_init+0x3e4/0x884 [ 1210.462215] tc_ctl_tfilter+0xde3/0x1c01 [ 1210.468781] rtnetlink_rcv_msg+0x3be/0xb10 [ 1210.474949] netlink_rcv_skb+0x125/0x390 [ 1210.479851] netlink_unicast+0x437/0x610 [ 1210.486285] netlink_sendmsg+0x62e/0xb80 [ 1210.492077] sock_sendmsg+0xb5/0x100 [ 1210.496625] ___sys_sendmsg+0x326/0x800 [ 1210.502858] __sys_sendmmsg+0x129/0x330 [ 1210.509867] SyS_sendmmsg+0x2f/0x50 [ 1210.514951] do_syscall_64+0x1d5/0x640 17:37:11 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101102, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r6}}, 0x18) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @loopback, @local, 0x0, 0x0, 0xc7d1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 1210.521979] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1210.531464] [ 1210.533952] Freed by task 7447: [ 1210.539426] kasan_slab_free+0xc3/0x1a0 [ 1210.545943] kfree+0xc9/0x250 [ 1210.549705] u32_destroy_key.constprop.0.isra.0+0x105/0x1d0 [ 1210.557782] u32_delete_key_freepf_work+0x1c/0x30 [ 1210.563316] process_one_work+0x793/0x14a0 [ 1210.569368] worker_thread+0x5cc/0xff0 17:37:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) 17:37:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x80006, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1210.576266] kthread+0x30d/0x420 [ 1210.580134] ret_from_fork+0x24/0x30 [ 1210.584301] [ 1210.586114] The buggy address belongs to the object at ffff88804c236d80 [ 1210.586114] which belongs to the cache kmalloc-64 of size 64 [ 1210.603811] The buggy address is located 24 bytes inside of [ 1210.603811] 64-byte region [ffff88804c236d80, ffff88804c236dc0) [ 1210.620831] The buggy address belongs to the page: [ 1210.629330] page:ffffea0001308d80 count:1 mapcount:0 mapping:ffff88804c236000 index:0xffff88804c236180 [ 1210.643014] flags: 0xfffe0000000100(slab) [ 1210.648506] raw: 00fffe0000000100 ffff88804c236000 ffff88804c236180 000000010000001f [ 1210.660429] raw: ffffea000229b5e0 ffffea0002324820 ffff88812fe54340 0000000000000000 [ 1210.672835] page dumped because: kasan: bad access detected [ 1210.680586] [ 1210.682442] Memory state around the buggy address: [ 1210.690557] ffff88804c236c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1210.701467] ffff88804c236d00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1210.712034] >ffff88804c236d80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1210.724176] ^ [ 1210.728781] ffff88804c236e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1210.737585] ffff88804c236e80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1210.746405] ================================================================== [ 1210.755790] Disabling lock debugging due to kernel taint [ 1210.772091] Kernel panic - not syncing: panic_on_warn set ... 17:37:12 executing program 2: syz_mount_image$hfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@uname={'uname', 0x3d, 'hfs\x00'}}, {@mmap='mmap'}], [{@subj_role={'subj_role', 0x3d, 'gid'}}, {@euid_lt={'euid<'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}}) [ 1210.772091] [ 1210.780208] CPU: 0 PID: 7447 Comm: kworker/u4:0 Tainted: G B 4.14.189-syzkaller #0 [ 1210.790946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.804161] Workqueue: tc_filter_workqueue u32_delete_key_freepf_work [ 1210.813202] Call Trace: [ 1210.816373] dump_stack+0x1b2/0x283 [ 1210.824617] panic+0x1f9/0x42d [ 1210.828687] ? add_taint.cold+0x16/0x16 [ 1210.833758] ? ___preempt_schedule+0x16/0x18 [ 1210.838398] kasan_end_report+0x43/0x49 [ 1210.842922] kasan_report_error.cold+0xa7/0x194 [ 1210.848301] ? u32_destroy_key.constprop.0.isra.0+0x1a4/0x1d0 [ 1210.857222] __asan_report_load4_noabort+0x68/0x70 [ 1210.864961] ? u32_destroy_key.constprop.0.isra.0+0x1a4/0x1d0 [ 1210.874885] u32_destroy_key.constprop.0.isra.0+0x1a4/0x1d0 [ 1210.883186] u32_delete_key_freepf_work+0x1c/0x30 [ 1210.890183] process_one_work+0x793/0x14a0 [ 1210.895391] ? work_busy+0x320/0x320 [ 1210.902424] ? worker_thread+0x158/0xff0 [ 1210.907368] ? _raw_spin_unlock_irq+0x24/0x80 [ 1210.912741] worker_thread+0x5cc/0xff0 [ 1210.917577] ? rescuer_thread+0xc80/0xc80 [ 1210.922851] kthread+0x30d/0x420 [ 1210.927820] ? kthread_create_on_node+0xd0/0xd0 [ 1210.933989] ret_from_fork+0x24/0x30 [ 1210.940040] Kernel Offset: disabled [ 1210.944625] Rebooting in 86400 seconds..