:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x3504}, 0x0) 10:42:01 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x40010000, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:01 executing program 4: prctl$PR_GET_DUMPABLE(0x3) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:01 executing program 2 (fault-call:10 fault-nth:3): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1234.329598] hfs: unable to parse mount options 10:42:01 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x200000000000000) 10:42:01 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0xf, "420fb942"}}]}) 10:42:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xe8, 0x0, 0x1b8, 0x1b8, 0xe8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00', {}, {}, 0x16}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00', '\x00', {}, {0xff}}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xfffffffffffffe36) [ 1234.449646] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1234.479152] hfs: unable to parse mount options [ 1234.531752] hfs: unable to parse mount options [ 1234.555350] FAULT_INJECTION: forcing a failure. [ 1234.555350] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.567446] CPU: 0 PID: 7820 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1234.575274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.584641] Call Trace: [ 1234.587256] dump_stack+0x188/0x20d [ 1234.590904] should_fail.cold+0xa/0x1b [ 1234.594807] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1234.599924] ? __lock_is_held+0xad/0x140 [ 1234.604014] __should_failslab+0x115/0x180 [ 1234.608273] should_failslab+0x5/0xf [ 1234.611994] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1234.616679] ? cap_capable+0x1eb/0x250 [ 1234.620588] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1234.625812] tcf_chain_create+0x4d/0x280 [ 1234.629917] ? __dev_get_by_index+0xf7/0x140 [ 1234.634346] __tcf_chain_get+0x1d9/0x250 [ 1234.638516] tc_new_tfilter+0x3c3/0x1450 [ 1234.642602] ? tc_del_tfilter+0xd40/0xd40 [ 1234.646761] ? _raw_spin_unlock+0x29/0x40 [ 1234.650917] ? __mutex_lock+0x3cd/0x1300 [ 1234.654994] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 1234.659417] ? kfree_skbmem+0xc1/0x140 [ 1234.663317] ? mutex_trylock+0x1a0/0x1a0 [ 1234.667411] ? tc_del_tfilter+0xd40/0xd40 [ 1234.671574] rtnetlink_rcv_msg+0x453/0xaf0 [ 1234.675917] ? rtnetlink_put_metrics+0x520/0x520 [ 1234.680784] ? perf_trace_lock+0xeb/0x4c0 [ 1234.684961] ? __copy_skb_header+0x2f0/0x510 [ 1234.689390] ? SOFTIRQ_verbose+0x10/0x10 [ 1234.693469] netlink_rcv_skb+0x160/0x410 [ 1234.697568] ? rtnetlink_put_metrics+0x520/0x520 [ 1234.702348] ? netlink_ack+0xa60/0xa60 [ 1234.706264] netlink_unicast+0x4d7/0x6a0 [ 1234.710342] ? netlink_attachskb+0x710/0x710 [ 1234.714771] netlink_sendmsg+0x80b/0xcd0 [ 1234.718855] ? netlink_unicast+0x6a0/0x6a0 [ 1234.723103] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1234.728310] ? netlink_unicast+0x6a0/0x6a0 [ 1234.732566] sock_sendmsg+0xcf/0x120 [ 1234.736293] ___sys_sendmsg+0x3e2/0x920 [ 1234.740290] ? copy_msghdr_from_user+0x410/0x410 [ 1234.745054] ? __fget+0x319/0x510 [ 1234.748530] ? lock_downgrade+0x740/0x740 [ 1234.752701] ? check_preemption_disabled+0x41/0x280 [ 1234.757734] ? __fget+0x340/0x510 [ 1234.761207] ? iterate_fd+0x350/0x350 [ 1234.765023] ? perf_trace_lock+0xeb/0x4c0 [ 1234.769179] ? get_pid_task+0xf4/0x190 [ 1234.773080] ? __fget_light+0x1d1/0x230 [ 1234.777070] __sys_sendmmsg+0x195/0x470 [ 1234.781061] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1234.785411] ? lock_downgrade+0x740/0x740 [ 1234.789586] ? __mutex_unlock_slowpath+0xea/0x670 [ 1234.794442] ? check_preemption_disabled+0x41/0x280 [ 1234.799471] ? wait_for_completion+0x3c0/0x3c0 [ 1234.804072] ? vfs_write+0x15b/0x550 [ 1234.807799] ? ksys_write+0x1c8/0x2a0 [ 1234.811617] ? __ia32_sys_read+0xb0/0xb0 [ 1234.815690] ? __ia32_sys_clock_settime+0x260/0x260 [ 1234.820721] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1234.825493] __x64_sys_sendmmsg+0x99/0x100 [ 1234.829744] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1234.834339] do_syscall_64+0xf9/0x620 [ 1234.838193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1234.843390] RIP: 0033:0x45c799 [ 1234.846613] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1234.865528] RSP: 002b:00007fefbf397c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1234.873255] RAX: ffffffffffffffda RBX: 00007fefbf3986d4 RCX: 000000000045c799 [ 1234.880661] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1234.887955] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1234.895246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 10:42:01 executing program 4: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:01 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x10, "420fb942"}}]}) [ 1234.902526] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000003 [ 1234.917189] device veth1165 entered promiscuous mode [ 1234.938463] device veth1165 left promiscuous mode 10:42:01 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x48000000, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000045803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x1) 10:42:01 executing program 2 (fault-call:10 fault-nth:4): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1235.035097] hfs: unable to parse mount options [ 1235.072979] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1235.097691] hfs: unable to parse mount options 10:42:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 10:42:01 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x300000000000000) 10:42:01 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x11, "420fb942"}}]}) 10:42:01 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:01 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x4c000000, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1235.247112] FAULT_INJECTION: forcing a failure. [ 1235.247112] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.271616] hfs: unable to parse mount options [ 1235.277114] CPU: 0 PID: 8092 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1235.284938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.294313] Call Trace: [ 1235.296923] dump_stack+0x188/0x20d [ 1235.300590] should_fail.cold+0xa/0x1b [ 1235.304491] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1235.309614] ? __lock_is_held+0xad/0x140 [ 1235.313708] __should_failslab+0x115/0x180 [ 1235.317958] should_failslab+0x5/0xf [ 1235.321707] kmem_cache_alloc_node+0x260/0x730 [ 1235.326308] ? __lock_is_held+0xad/0x140 [ 1235.330389] __alloc_skb+0xba/0x5b0 [ 1235.334036] ? skb_trim+0x180/0x180 [ 1235.337691] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1235.342668] ? cap_capable+0x1eb/0x250 [ 1235.346602] tc_chain_notify+0xcb/0x1f0 [ 1235.350605] __tcf_chain_get+0x209/0x250 [ 1235.354683] tc_new_tfilter+0x3c3/0x1450 [ 1235.358784] ? tc_del_tfilter+0xd40/0xd40 [ 1235.362943] ? _raw_spin_unlock+0x29/0x40 [ 1235.367107] ? __mutex_lock+0x3cd/0x1300 [ 1235.371195] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 1235.375627] ? kfree_skbmem+0xc1/0x140 [ 1235.380050] ? mutex_trylock+0x1a0/0x1a0 [ 1235.384152] ? tc_del_tfilter+0xd40/0xd40 [ 1235.388324] rtnetlink_rcv_msg+0x453/0xaf0 [ 1235.392584] ? rtnetlink_put_metrics+0x520/0x520 [ 1235.397351] ? netdev_pick_tx+0x2f0/0x2f0 [ 1235.401509] ? __copy_skb_header+0x2f0/0x510 [ 1235.405930] ? sock_spd_release+0x270/0x270 [ 1235.410272] netlink_rcv_skb+0x160/0x410 [ 1235.414348] ? rtnetlink_put_metrics+0x520/0x520 [ 1235.419129] ? netlink_ack+0xa60/0xa60 [ 1235.423046] netlink_unicast+0x4d7/0x6a0 [ 1235.427129] ? netlink_attachskb+0x710/0x710 [ 1235.431561] netlink_sendmsg+0x80b/0xcd0 [ 1235.435650] ? netlink_unicast+0x6a0/0x6a0 [ 1235.439894] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1235.445106] ? netlink_unicast+0x6a0/0x6a0 [ 1235.449353] sock_sendmsg+0xcf/0x120 [ 1235.453081] ___sys_sendmsg+0x3e2/0x920 [ 1235.457067] ? copy_msghdr_from_user+0x410/0x410 [ 1235.461836] ? __fget+0x319/0x510 [ 1235.465303] ? lock_downgrade+0x740/0x740 [ 1235.469469] ? check_preemption_disabled+0x41/0x280 [ 1235.474504] ? __fget+0x340/0x510 [ 1235.477977] ? iterate_fd+0x350/0x350 [ 1235.481791] ? get_pid_task+0xf4/0x190 [ 1235.485687] ? __fget_light+0x1d1/0x230 [ 1235.489696] __sys_sendmmsg+0x195/0x470 [ 1235.493696] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1235.498114] ? lock_downgrade+0x740/0x740 [ 1235.502413] ? __mutex_unlock_slowpath+0xea/0x670 [ 1235.507287] ? check_preemption_disabled+0x41/0x280 [ 1235.512325] ? wait_for_completion+0x3c0/0x3c0 [ 1235.516933] ? vfs_write+0x15b/0x550 [ 1235.520678] ? ksys_write+0x1c8/0x2a0 [ 1235.524503] ? __ia32_sys_read+0xb0/0xb0 [ 1235.528588] ? __ia32_sys_clock_settime+0x260/0x260 [ 1235.533623] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1235.538407] __x64_sys_sendmmsg+0x99/0x100 [ 1235.542660] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1235.547261] do_syscall_64+0xf9/0x620 [ 1235.551087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1235.556283] RIP: 0033:0x45c799 [ 1235.559484] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1235.578524] RSP: 002b:00007fefbf355c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1235.586263] RAX: ffffffffffffffda RBX: 00007fefbf3566d4 RCX: 000000000045c799 [ 1235.593547] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1235.600828] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1235.608107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1235.615390] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000004 [ 1235.633259] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:02 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000040)={0x9a0000, 0x1, 0x2, r0, 0x0, &(0x7f0000000000)={0x9909d8, 0x9, [], @ptr}}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x43, &(0x7f0000000980)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x228, 0xe8, 0x0, 0x0, 0x2f8, 0x2f8, 0x2f8, 0x2f8, 0x2f8, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00', {}, {}, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [0x0, 0x0, 0x0, 0xff000000], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0, 0x0, {}, [@common=@hl={{0x0, 'hl\x00'}, {0x3, 0x7}}, @common=@dst={{0x0, 'dst\x00'}, {0x9, 0x1, 0x0, [0x7ff, 0x8492, 0x0, 0x0, 0x1, 0x7c0, 0x2, 0x1, 0x8001, 0x5, 0x8, 0x2, 0x7, 0x1000, 0x3f], 0x7}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [0x0, 0x0, 0x0, 0xffffff00], [], 'veth1_to_bridge\x00', '\x00', {}, {}, 0x3b}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3eb) [ 1235.646039] xt_check_table_hooks: 2 callbacks suppressed [ 1235.646049] x_tables: duplicate underflow at hook 2 [ 1235.667170] hfs: unable to parse mount options 10:42:02 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x12, "420fb942"}}]}) [ 1235.729184] device veth1167 entered promiscuous mode [ 1235.756361] device veth1167 left promiscuous mode 10:42:02 executing program 2 (fault-call:10 fault-nth:5): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1235.818184] hfs: unable to parse mount options 10:42:02 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x1b8, 0x0, 0x0, 0x0, 0xe8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [0xffffff00], [0x0, 0xffffffff], 'rose0\x00', 'bridge_slave_1\x00', {}, {}, 0x0, 0x0, 0x1}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [0x0, 0x0, 0x0, 0xff0000ff], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x400000000000000) 10:42:02 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x60000000, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1235.915771] hfs: unable to parse mount options [ 1235.932560] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:02 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x13, "420fb942"}}]}) [ 1236.014520] x_tables: duplicate underflow at hook 2 [ 1236.076743] FAULT_INJECTION: forcing a failure. [ 1236.076743] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.081765] hfs: unable to parse mount options [ 1236.099317] CPU: 0 PID: 8217 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1236.107159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.116531] Call Trace: [ 1236.119143] dump_stack+0x188/0x20d [ 1236.122804] should_fail.cold+0xa/0x1b [ 1236.126716] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1236.131846] ? __lock_is_held+0xad/0x140 [ 1236.135940] __should_failslab+0x115/0x180 [ 1236.140186] should_failslab+0x5/0xf [ 1236.143913] kmem_cache_alloc_node_trace+0x272/0x750 [ 1236.149039] __kmalloc_node_track_caller+0x38/0x70 [ 1236.153983] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1236.158688] __alloc_skb+0xef/0x5b0 [ 1236.162326] ? skb_trim+0x180/0x180 [ 1236.165963] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1236.170819] ? cap_capable+0x1eb/0x250 [ 1236.174720] tc_chain_notify+0xcb/0x1f0 [ 1236.178731] __tcf_chain_get+0x209/0x250 [ 1236.182816] tc_new_tfilter+0x3c3/0x1450 [ 1236.186905] ? tc_del_tfilter+0xd40/0xd40 [ 1236.191070] ? _raw_spin_unlock+0x29/0x40 [ 1236.195233] ? __mutex_lock+0x3cd/0x1300 [ 1236.199445] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 1236.203870] ? kfree_skbmem+0xc1/0x140 [ 1236.207769] ? mutex_trylock+0x1a0/0x1a0 [ 1236.211850] ? tc_del_tfilter+0xd40/0xd40 [ 1236.216029] rtnetlink_rcv_msg+0x453/0xaf0 [ 1236.220287] ? rtnetlink_put_metrics+0x520/0x520 [ 1236.225058] ? perf_trace_lock+0xeb/0x4c0 [ 1236.229215] ? __copy_skb_header+0x2f0/0x510 [ 1236.233635] ? SOFTIRQ_verbose+0x10/0x10 [ 1236.237717] netlink_rcv_skb+0x160/0x410 [ 1236.241791] ? rtnetlink_put_metrics+0x520/0x520 [ 1236.246560] ? netlink_ack+0xa60/0xa60 [ 1236.250472] netlink_unicast+0x4d7/0x6a0 [ 1236.254549] ? netlink_attachskb+0x710/0x710 [ 1236.258979] netlink_sendmsg+0x80b/0xcd0 [ 1236.263055] ? netlink_unicast+0x6a0/0x6a0 [ 1236.267303] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1236.272525] ? netlink_unicast+0x6a0/0x6a0 [ 1236.276774] sock_sendmsg+0xcf/0x120 [ 1236.280499] ___sys_sendmsg+0x3e2/0x920 [ 1236.284493] ? copy_msghdr_from_user+0x410/0x410 [ 1236.289262] ? __fget+0x319/0x510 [ 1236.292735] ? lock_downgrade+0x740/0x740 [ 1236.296908] ? check_preemption_disabled+0x41/0x280 [ 1236.301956] ? __fget+0x340/0x510 [ 1236.305427] ? iterate_fd+0x350/0x350 [ 1236.309373] ? perf_trace_lock+0xeb/0x4c0 [ 1236.313576] ? get_pid_task+0xf4/0x190 [ 1236.317485] ? __fget_light+0x1d1/0x230 [ 1236.321485] __sys_sendmmsg+0x195/0x470 [ 1236.325482] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1236.329825] ? lock_downgrade+0x740/0x740 [ 1236.334005] ? __mutex_unlock_slowpath+0xea/0x670 [ 1236.338861] ? check_preemption_disabled+0x41/0x280 [ 1236.343991] ? wait_for_completion+0x3c0/0x3c0 [ 1236.348591] ? vfs_write+0x15b/0x550 [ 1236.352453] ? ksys_write+0x1c8/0x2a0 [ 1236.356299] ? __ia32_sys_read+0xb0/0xb0 [ 1236.360378] ? __ia32_sys_clock_settime+0x260/0x260 [ 1236.365413] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1236.370185] __x64_sys_sendmmsg+0x99/0x100 [ 1236.374437] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1236.379035] do_syscall_64+0xf9/0x620 [ 1236.382850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.388046] RIP: 0033:0x45c799 [ 1236.391251] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1236.410246] RSP: 002b:00007fefbf397c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1236.417971] RAX: ffffffffffffffda RBX: 00007fefbf3986d4 RCX: 000000000045c799 [ 1236.425251] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1236.432529] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1236.439822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1236.447097] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000005 10:42:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 10:42:03 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x5, 0x10000) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x5) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:03 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x68000000, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:03 executing program 2 (fault-call:10 fault-nth:6): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1236.503409] hfs: unable to parse mount options 10:42:03 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x600000000000000) 10:42:03 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x14, "420fb942"}}]}) [ 1236.574149] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1236.587849] x_tables: duplicate underflow at hook 2 10:42:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vga_arbiter\x00', 0x404000, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x7fff) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x32d440, 0x0) sendmsg$IPSET_CMD_TEST(r3, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x78, 0xb, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x1}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x80}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x4c, 0x7, 0x0, 0x1, [@IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x7fffffff}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x6}, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x3}}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x6a}, @IPSET_ATTR_CIDR={0x5, 0x3, 0xff}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000004}, 0x800c0d0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCL_GETKMSGREDIRECT(r4, 0x541c, &(0x7f0000000000)) [ 1236.687593] hfs: unable to parse mount options 10:42:03 executing program 2 (fault-call:10 fault-nth:7): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) 10:42:03 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x68040000, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1236.718093] device veth1167 entered promiscuous mode [ 1236.718325] FAULT_INJECTION: forcing a failure. [ 1236.718325] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1236.718342] CPU: 0 PID: 8399 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 10:42:03 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x15, "420fb942"}}]}) [ 1236.718352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.718358] Call Trace: [ 1236.718381] dump_stack+0x188/0x20d [ 1236.718405] should_fail.cold+0xa/0x1b [ 1236.718425] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1236.718444] ? check_preemption_disabled+0x41/0x280 [ 1236.718466] ? perf_trace_lock+0xeb/0x4c0 [ 1236.718505] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1236.718521] ? SOFTIRQ_verbose+0x10/0x10 [ 1236.718548] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1236.718563] ? kmem_cache_alloc_trace+0x14d/0x7a0 [ 1236.718584] ? fs_reclaim_acquire+0x10/0x10 [ 1236.718598] ? should_fail+0x142/0x7bc [ 1236.718620] cache_grow_begin+0x8e/0x8a0 [ 1236.718663] kmem_cache_alloc_node_trace+0x67d/0x750 [ 1236.718692] __kmalloc_node_track_caller+0x38/0x70 [ 1236.718715] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1236.718737] __alloc_skb+0xef/0x5b0 [ 1236.718756] ? skb_trim+0x180/0x180 [ 1236.718770] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1236.718789] ? cap_capable+0x1eb/0x250 [ 1236.718810] tc_chain_notify+0xcb/0x1f0 10:42:03 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0xa00000000000000) [ 1236.718829] __tcf_chain_get+0x209/0x250 [ 1236.718848] tc_new_tfilter+0x3c3/0x1450 [ 1236.718874] ? tc_del_tfilter+0xd40/0xd40 [ 1236.718888] ? _raw_spin_unlock+0x29/0x40 [ 1236.718909] ? __mutex_lock+0x3cd/0x1300 [ 1236.718928] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 1236.718947] ? kfree_skbmem+0xc1/0x140 [ 1236.718965] ? mutex_trylock+0x1a0/0x1a0 [ 1236.719002] ? tc_del_tfilter+0xd40/0xd40 [ 1236.719020] rtnetlink_rcv_msg+0x453/0xaf0 [ 1236.719041] ? rtnetlink_put_metrics+0x520/0x520 [ 1236.719059] ? perf_trace_lock+0xeb/0x4c0 [ 1236.719075] ? __copy_skb_header+0x2f0/0x510 [ 1236.719093] ? SOFTIRQ_verbose+0x10/0x10 [ 1236.719117] netlink_rcv_skb+0x160/0x410 [ 1236.719137] ? rtnetlink_put_metrics+0x520/0x520 [ 1236.719157] ? netlink_ack+0xa60/0xa60 [ 1236.719191] netlink_unicast+0x4d7/0x6a0 [ 1236.719214] ? netlink_attachskb+0x710/0x710 [ 1236.719242] netlink_sendmsg+0x80b/0xcd0 [ 1236.719266] ? netlink_unicast+0x6a0/0x6a0 [ 1236.719280] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1236.719307] ? netlink_unicast+0x6a0/0x6a0 [ 1236.719321] sock_sendmsg+0xcf/0x120 [ 1236.719337] ___sys_sendmsg+0x3e2/0x920 [ 1236.719355] ? copy_msghdr_from_user+0x410/0x410 [ 1236.719370] ? __fget+0x319/0x510 [ 1236.719392] ? lock_downgrade+0x740/0x740 [ 1236.719411] ? check_preemption_disabled+0x41/0x280 [ 1236.719433] ? __fget+0x340/0x510 [ 1236.719453] ? iterate_fd+0x350/0x350 [ 1236.719471] ? perf_trace_lock+0xeb/0x4c0 [ 1236.719484] ? get_pid_task+0xf4/0x190 [ 1236.719503] ? __fget_light+0x1d1/0x230 [ 1236.719525] __sys_sendmmsg+0x195/0x470 [ 1236.719546] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1236.719563] ? lock_downgrade+0x740/0x740 [ 1236.719591] ? __mutex_unlock_slowpath+0xea/0x670 [ 1236.719610] ? check_preemption_disabled+0x41/0x280 [ 1236.719627] ? wait_for_completion+0x3c0/0x3c0 [ 1236.719645] ? vfs_write+0x15b/0x550 [ 1236.719665] ? ksys_write+0x1c8/0x2a0 [ 1236.719682] ? __ia32_sys_read+0xb0/0xb0 [ 1236.719697] ? __ia32_sys_clock_settime+0x260/0x260 [ 1236.719715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1236.719734] __x64_sys_sendmmsg+0x99/0x100 [ 1236.719751] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1236.719767] do_syscall_64+0xf9/0x620 [ 1236.719786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.719799] RIP: 0033:0x45c799 [ 1236.719814] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1236.719823] RSP: 002b:00007fefbf355c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1236.719838] RAX: ffffffffffffffda RBX: 00007fefbf3566d4 RCX: 000000000045c799 [ 1236.719848] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1236.719857] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1236.719866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1236.719876] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000006 [ 1236.722185] device veth1167 left promiscuous mode [ 1236.739188] hfs: unable to parse mount options [ 1236.828996] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1236.883895] x_tables: duplicate underflow at hook 2 [ 1236.890183] hfs: unable to parse mount options [ 1236.916317] FAULT_INJECTION: forcing a failure. [ 1236.916317] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.953689] device veth1167 entered promiscuous mode [ 1236.965770] CPU: 1 PID: 8468 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1236.975522] device veth1167 left promiscuous mode [ 1236.977500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.977506] Call Trace: [ 1236.977529] dump_stack+0x188/0x20d [ 1236.977553] should_fail.cold+0xa/0x1b [ 1236.977568] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1236.977592] __should_failslab+0x115/0x180 [ 1237.335584] should_failslab+0x5/0xf [ 1237.335598] kmem_cache_alloc_node_trace+0x272/0x750 [ 1237.335620] __kmalloc_node_track_caller+0x38/0x70 10:42:04 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x16, "420fb942"}}]}) 10:42:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x4800}, 0x0) [ 1237.335638] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1237.335651] ? rw_copy_check_uvector+0x2a3/0x330 [ 1237.335666] __alloc_skb+0xef/0x5b0 [ 1237.335680] ? skb_trim+0x180/0x180 [ 1237.335705] netlink_sendmsg+0x8d6/0xcd0 [ 1237.335725] ? netlink_unicast+0x6a0/0x6a0 10:42:04 executing program 2 (fault-call:10 fault-nth:8): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1237.335736] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1237.335758] ? netlink_unicast+0x6a0/0x6a0 [ 1237.335769] sock_sendmsg+0xcf/0x120 [ 1237.335781] ___sys_sendmsg+0x3e2/0x920 [ 1237.335796] ? copy_msghdr_from_user+0x410/0x410 [ 1237.335816] ? mark_held_locks+0xf0/0xf0 10:42:04 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SET_FPEXC(0xc, 0x10000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x3b8) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) [ 1237.335827] ? lock_downgrade+0x740/0x740 [ 1237.335844] ? check_preemption_disabled+0x41/0x280 [ 1237.335870] ? find_held_lock+0x2d/0x110 [ 1237.335883] ? __might_fault+0x11f/0x1d0 [ 1237.335902] ? lock_downgrade+0x740/0x740 [ 1237.335925] __sys_sendmmsg+0x195/0x470 [ 1237.335942] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1237.335955] ? lock_downgrade+0x740/0x740 [ 1237.335980] ? __mutex_unlock_slowpath+0xea/0x670 [ 1237.335994] ? check_preemption_disabled+0x41/0x280 [ 1237.336007] ? wait_for_completion+0x3c0/0x3c0 [ 1237.336021] ? vfs_write+0x15b/0x550 [ 1237.336036] ? ksys_write+0x1c8/0x2a0 [ 1237.336049] ? __ia32_sys_read+0xb0/0xb0 [ 1237.336062] ? __ia32_sys_clock_settime+0x260/0x260 [ 1237.336075] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1237.336090] __x64_sys_sendmmsg+0x99/0x100 [ 1237.336102] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1237.336115] do_syscall_64+0xf9/0x620 [ 1237.336130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1237.336140] RIP: 0033:0x45c799 [ 1237.336153] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1237.336160] RSP: 002b:00007fefbf376c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1237.336172] RAX: ffffffffffffffda RBX: 00007fefbf3776d4 RCX: 000000000045c799 [ 1237.336179] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1237.336186] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1237.336192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 10:42:04 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x6c000000, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1237.336199] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000007 [ 1237.374586] hfs: unable to parse mount options [ 1237.535430] hfs: unable to parse mount options [ 1237.557841] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1237.584507] hfs: unable to parse mount options [ 1237.792925] x_tables: duplicate underflow at hook 2 [ 1237.818990] FAULT_INJECTION: forcing a failure. [ 1237.818990] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.835036] CPU: 0 PID: 8590 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1237.842879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.852335] Call Trace: [ 1237.855055] dump_stack+0x188/0x20d [ 1237.858715] should_fail.cold+0xa/0x1b [ 1237.862634] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1237.867756] ? __lock_is_held+0xad/0x140 [ 1237.871842] __should_failslab+0x115/0x180 [ 1237.876108] should_failslab+0x5/0xf [ 1237.879839] kmem_cache_alloc_node+0x260/0x730 [ 1237.884438] ? consume_skb+0xe/0x380 [ 1237.888175] ? netlink_broadcast_filtered+0x3b8/0xb50 [ 1237.893411] __alloc_skb+0xba/0x5b0 [ 1237.897077] ? skb_trim+0x180/0x180 [ 1237.900716] ? netlink_broadcast+0x35/0x40 [ 1237.904975] ? __lock_is_held+0xad/0x140 [ 1237.909059] tc_chain_notify+0xcb/0x1f0 [ 1237.913050] __tcf_chain_put+0x358/0x4c0 [ 1237.917121] tc_new_tfilter+0xd03/0x1450 [ 1237.921208] ? tc_del_tfilter+0xd40/0xd40 [ 1237.925360] ? _raw_spin_unlock+0x29/0x40 [ 1237.929517] ? __mutex_lock+0x3cd/0x1300 [ 1237.933595] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 1237.938646] ? tc_del_tfilter+0xd40/0xd40 [ 1237.942801] rtnetlink_rcv_msg+0x453/0xaf0 [ 1237.947060] ? rtnetlink_put_metrics+0x520/0x520 [ 1237.951824] ? native_iret+0x7/0x7 [ 1237.955370] ? error_exit+0xb/0x20 [ 1237.958919] ? netlink_deliver_tap+0x22d/0xb90 [ 1237.963522] netlink_rcv_skb+0x160/0x410 [ 1237.967597] ? rtnetlink_put_metrics+0x520/0x520 [ 1237.972364] ? netlink_ack+0xa60/0xa60 [ 1237.976273] netlink_unicast+0x4d7/0x6a0 [ 1237.980343] ? netlink_attachskb+0x710/0x710 [ 1237.984769] netlink_sendmsg+0x80b/0xcd0 [ 1237.988931] ? netlink_unicast+0x6a0/0x6a0 [ 1237.993174] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1237.998381] ? netlink_unicast+0x6a0/0x6a0 [ 1238.002623] sock_sendmsg+0xcf/0x120 [ 1238.006343] ___sys_sendmsg+0x3e2/0x920 [ 1238.010323] ? copy_msghdr_from_user+0x410/0x410 [ 1238.015084] ? __fget+0x319/0x510 [ 1238.018559] ? lock_downgrade+0x740/0x740 [ 1238.022718] ? check_preemption_disabled+0x41/0x280 [ 1238.027747] ? __fget+0x340/0x510 [ 1238.031209] ? iterate_fd+0x350/0x350 [ 1238.035017] ? native_iret+0x7/0x7 [ 1238.038564] ? error_exit+0xb/0x20 [ 1238.042119] ? __fget_light+0x1d1/0x230 [ 1238.046102] __sys_sendmmsg+0x195/0x470 [ 1238.050087] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1238.054420] ? lock_downgrade+0x740/0x740 [ 1238.058587] ? __mutex_unlock_slowpath+0xea/0x670 [ 1238.063471] ? check_preemption_disabled+0x41/0x280 [ 1238.068532] ? wait_for_completion+0x3c0/0x3c0 [ 1238.073140] ? vfs_write+0x15b/0x550 [ 1238.076883] ? ksys_write+0x1c8/0x2a0 [ 1238.080700] ? __ia32_sys_read+0xb0/0xb0 [ 1238.084867] ? __ia32_sys_clock_settime+0x260/0x260 [ 1238.089911] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1238.094703] __x64_sys_sendmmsg+0x99/0x100 [ 1238.099083] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1238.103697] do_syscall_64+0xf9/0x620 [ 1238.107517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1238.112717] RIP: 0033:0x45c799 [ 1238.115918] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1238.134838] RSP: 002b:00007fefbf355c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 10:42:04 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x17, "420fb942"}}]}) [ 1238.142557] RAX: ffffffffffffffda RBX: 00007fefbf3566d4 RCX: 000000000045c799 [ 1238.149829] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1238.157103] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1238.164376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1238.171648] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000008 10:42:04 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x70030000, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:05 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0xc00000000000000) 10:42:05 executing program 2 (fault-call:10 fault-nth:9): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1238.252121] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1238.263096] hfs: unable to parse mount options [ 1238.274006] x_tables: duplicate underflow at hook 2 [ 1238.359804] device veth1167 entered promiscuous mode [ 1238.379274] hfs: unable to parse mount options 10:42:05 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x74000000, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x4c00}, 0x0) 10:42:05 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x18, "420fb942"}}]}) [ 1238.472641] FAULT_INJECTION: forcing a failure. [ 1238.472641] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.517805] CPU: 0 PID: 8759 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1238.525648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.535015] Call Trace: [ 1238.537624] dump_stack+0x188/0x20d [ 1238.541276] should_fail.cold+0xa/0x1b [ 1238.545204] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1238.550322] ? __lock_is_held+0xad/0x140 [ 1238.554409] __should_failslab+0x115/0x180 [ 1238.558659] should_failslab+0x5/0xf [ 1238.562382] kmem_cache_alloc_node_trace+0x272/0x750 [ 1238.567501] __kmalloc_node_track_caller+0x38/0x70 [ 1238.572446] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1238.577132] __alloc_skb+0xef/0x5b0 [ 1238.580774] ? skb_trim+0x180/0x180 [ 1238.584421] ? netlink_broadcast+0x35/0x40 [ 1238.588670] ? __lock_is_held+0xad/0x140 [ 1238.592750] tc_chain_notify+0xcb/0x1f0 [ 1238.596740] __tcf_chain_put+0x358/0x4c0 [ 1238.600822] tc_new_tfilter+0xd03/0x1450 [ 1238.604893] ? lock_acquire+0xa1/0x400 [ 1238.608800] ? tc_del_tfilter+0xd40/0xd40 [ 1238.612962] ? __mutex_lock+0x3cd/0x1300 [ 1238.617035] ? selinux_ipv4_output+0x50/0x50 [ 1238.621464] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 1238.625889] ? kfree_skbmem+0xc1/0x140 [ 1238.629821] ? tc_del_tfilter+0xd40/0xd40 [ 1238.633984] rtnetlink_rcv_msg+0x453/0xaf0 [ 1238.638240] ? rtnetlink_put_metrics+0x520/0x520 [ 1238.643015] ? netdev_pick_tx+0x2f0/0x2f0 [ 1238.647178] ? __copy_skb_header+0x2f0/0x510 [ 1238.651603] ? sock_spd_release+0x270/0x270 [ 1238.655942] netlink_rcv_skb+0x160/0x410 [ 1238.660018] ? rtnetlink_put_metrics+0x520/0x520 [ 1238.664795] ? netlink_ack+0xa60/0xa60 [ 1238.668712] netlink_unicast+0x4d7/0x6a0 [ 1238.672794] ? netlink_attachskb+0x710/0x710 [ 1238.677220] netlink_sendmsg+0x80b/0xcd0 [ 1238.681298] ? netlink_unicast+0x6a0/0x6a0 [ 1238.685543] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1238.690750] ? netlink_unicast+0x6a0/0x6a0 [ 1238.694993] sock_sendmsg+0xcf/0x120 [ 1238.698716] ___sys_sendmsg+0x3e2/0x920 [ 1238.702699] ? copy_msghdr_from_user+0x410/0x410 [ 1238.707462] ? __fget+0x319/0x510 [ 1238.710929] ? lock_downgrade+0x740/0x740 [ 1238.715084] ? check_preemption_disabled+0x41/0x280 [ 1238.720122] ? __fget+0x340/0x510 [ 1238.723592] ? iterate_fd+0x350/0x350 [ 1238.724234] hfs: unable to parse mount options [ 1238.727397] ? get_pid_task+0xf4/0x190 [ 1238.727419] ? __fget_light+0x1d1/0x230 [ 1238.739853] __sys_sendmmsg+0x195/0x470 [ 1238.743845] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1238.748177] ? lock_downgrade+0x740/0x740 [ 1238.752348] ? __mutex_unlock_slowpath+0xea/0x670 [ 1238.757206] ? check_preemption_disabled+0x41/0x280 [ 1238.762237] ? wait_for_completion+0x3c0/0x3c0 [ 1238.766827] ? vfs_write+0x15b/0x550 [ 1238.770554] ? ksys_write+0x1c8/0x2a0 [ 1238.774356] ? __ia32_sys_read+0xb0/0xb0 [ 1238.778421] ? __ia32_sys_clock_settime+0x260/0x260 [ 1238.783465] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1238.788248] __x64_sys_sendmmsg+0x99/0x100 [ 1238.792500] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1238.797112] do_syscall_64+0xf9/0x620 [ 1238.800935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1238.806133] RIP: 0033:0x45c799 10:42:05 executing program 4: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f00000009c0)='-\x00', &(0x7f0000000a00)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000800000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000004000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0xfffffffffffffdf8, r3, 0x1, 0x0, 0xfffffffd, {0x2}, [@L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x5}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x4c, r2, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0xf1c3}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x400}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4044080}, 0x801) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r5, 0x0) ioctl$BLKIOOPT(r5, 0x1279, &(0x7f00000001c0)) r6 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYRES16=r6, @ANYBLOB="01200000ab09000000001b00000008009a00010000"], 0x2}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r6, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0x8000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0xc0a85352, &(0x7f0000000100)={{0x8, 0xff}, 'port0\x00', 0x1, 0x38008, 0x400, 0x20, 0x6, 0xfffffff8, 0x5, 0x0, 0x1, 0x1}) clone(0x40000, &(0x7f0000000200)="2ca99e416133", &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="3fac785b65834e98ec8d941b1252874a5725e724ec3a2ece7d2b95e0722cdacdfabf48408667543c27d00b18fdfec1f1152bf367bb8f8037ec3c28f55d9f6bdfc7aa0af5c55e34caf37aeb9a232982e98e3d447517714ed83550222a66f2744f75588364d0039537b8941b7c6d2d41b7e1628e9c6750c906064fa499dc6b8dd84e8419b0b06ff9ac17ba2c") lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:iptables_conf_t:s0\x00', 0x25, 0x3) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r7, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) open_by_handle_at(r7, &(0x7f0000000480)={0x29, 0x24, "87184d672f459263047b572d6c2ec8d2d40bff2b6c63b4bb98f9ae7ca3aaad8475"}, 0x6082) 10:42:05 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x7a000000, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1238.809337] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1238.828339] RSP: 002b:00007fefbf397c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1238.836061] RAX: ffffffffffffffda RBX: 00007fefbf3986d4 RCX: 000000000045c799 [ 1238.843339] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1238.850615] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1238.857891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 10:42:05 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0xe00000000000000) [ 1238.865172] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000009 10:42:05 executing program 2 (fault-call:10 fault-nth:10): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1238.902896] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1238.941092] hfs: unable to parse mount options [ 1238.975653] x_tables: duplicate underflow at hook 2 10:42:05 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x19, "420fb942"}}]}) [ 1239.059572] device veth1167 entered promiscuous mode 10:42:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0x0, 0xd0, 0x1a0, 0xd0, 0x1a0, 0x270, 0x270, 0x270, 0x270, 0x270, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [0x0, 0xff000000], [], 'rose0\x00', 'bridge_slave_1\x00', {}, {}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x5, 0x101}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b1100", [], [0x0, 0x0, 0x0, 0xff000000], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@mcast1, @empty, [], [], 'veth1_to_bridge\x00', '\x00', {}, {}, 0x0, 0x0, 0x2}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) [ 1239.087430] device veth1167 left promiscuous mode [ 1239.088266] hfs: unable to parse mount options [ 1239.158903] hfs: unable to parse mount options [ 1239.178125] FAULT_INJECTION: forcing a failure. [ 1239.178125] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1239.189976] CPU: 1 PID: 9046 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1239.197781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.207139] Call Trace: [ 1239.209748] dump_stack+0x188/0x20d [ 1239.213391] should_fail.cold+0xa/0x1b [ 1239.217293] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1239.222408] ? mark_held_locks+0xf0/0xf0 [ 1239.226487] ? rtnetlink_rcv_msg+0x453/0xaf0 [ 1239.230905] ? netlink_rcv_skb+0x160/0x410 [ 1239.235158] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1239.239840] ? mark_held_locks+0xf0/0xf0 [ 1239.243912] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1239.248940] ? fs_reclaim_acquire+0x10/0x10 [ 1239.253265] ? should_fail+0x142/0x7bc [ 1239.257165] cache_grow_begin+0x8e/0x8a0 [ 1239.261243] kmem_cache_alloc_node_trace+0x67d/0x750 [ 1239.266359] __kmalloc_node_track_caller+0x38/0x70 [ 1239.271299] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1239.275983] __alloc_skb+0xef/0x5b0 [ 1239.279619] ? skb_trim+0x180/0x180 [ 1239.283263] ? netlink_broadcast+0x35/0x40 [ 1239.287507] ? __lock_is_held+0xad/0x140 [ 1239.291577] tc_chain_notify+0xcb/0x1f0 [ 1239.295560] __tcf_chain_put+0x358/0x4c0 [ 1239.299629] tc_new_tfilter+0xd03/0x1450 [ 1239.303707] ? tc_del_tfilter+0xd40/0xd40 [ 1239.307861] ? _raw_spin_unlock+0x29/0x40 [ 1239.312013] ? __mutex_lock+0x3cd/0x1300 [ 1239.316084] ? rtnetlink_rcv_msg+0x3fe/0xaf0 [ 1239.320502] ? kfree_skbmem+0xc1/0x140 [ 1239.324423] ? tc_del_tfilter+0xd40/0xd40 [ 1239.328581] rtnetlink_rcv_msg+0x453/0xaf0 [ 1239.332828] ? rtnetlink_put_metrics+0x520/0x520 [ 1239.337593] ? netdev_pick_tx+0x2f0/0x2f0 [ 1239.341746] ? __copy_skb_header+0x2f0/0x510 [ 1239.346161] ? sock_spd_release+0x270/0x270 [ 1239.350642] netlink_rcv_skb+0x160/0x410 [ 1239.354727] ? rtnetlink_put_metrics+0x520/0x520 [ 1239.359500] ? netlink_ack+0xa60/0xa60 [ 1239.363416] netlink_unicast+0x4d7/0x6a0 [ 1239.367496] ? netlink_attachskb+0x710/0x710 [ 1239.371924] netlink_sendmsg+0x80b/0xcd0 [ 1239.376003] ? netlink_unicast+0x6a0/0x6a0 [ 1239.380244] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1239.385541] ? netlink_unicast+0x6a0/0x6a0 [ 1239.389787] sock_sendmsg+0xcf/0x120 [ 1239.393519] ___sys_sendmsg+0x3e2/0x920 [ 1239.397503] ? copy_msghdr_from_user+0x410/0x410 [ 1239.402267] ? __fget+0x319/0x510 [ 1239.405879] ? lock_downgrade+0x740/0x740 [ 1239.410057] ? check_preemption_disabled+0x41/0x280 [ 1239.415106] ? __fget+0x340/0x510 [ 1239.418580] ? iterate_fd+0x350/0x350 [ 1239.422411] ? get_pid_task+0xf4/0x190 [ 1239.426314] ? __fget_light+0x1d1/0x230 [ 1239.430306] __sys_sendmmsg+0x195/0x470 [ 1239.434295] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1239.438634] ? lock_downgrade+0x740/0x740 [ 1239.442806] ? __mutex_unlock_slowpath+0xea/0x670 [ 1239.447662] ? check_preemption_disabled+0x41/0x280 [ 1239.452687] ? wait_for_completion+0x3c0/0x3c0 [ 1239.457277] ? vfs_write+0x15b/0x550 [ 1239.460999] ? ksys_write+0x1c8/0x2a0 [ 1239.464807] ? __ia32_sys_read+0xb0/0xb0 [ 1239.468876] ? __ia32_sys_clock_settime+0x260/0x260 [ 1239.473900] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1239.478669] __x64_sys_sendmmsg+0x99/0x100 [ 1239.482917] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1239.487512] do_syscall_64+0xf9/0x620 [ 1239.491322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1239.496521] RIP: 0033:0x45c799 [ 1239.499720] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1239.518626] RSP: 002b:00007fefbf355c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1239.526500] RAX: ffffffffffffffda RBX: 00007fefbf3566d4 RCX: 000000000045c799 [ 1239.533815] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1239.541107] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1239.548501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 10:42:06 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0xffffff7f, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1239.555782] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 000000000000000a 10:42:06 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x1a, "420fb942"}}]}) 10:42:06 executing program 2 (fault-call:10 fault-nth:11): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1239.626419] x_tables: duplicate underflow at hook 2 [ 1239.632056] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:06 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0xf00000000000000) [ 1239.731136] hfs: unable to parse mount options [ 1239.750123] device veth1167 entered promiscuous mode [ 1239.758162] device veth1167 left promiscuous mode [ 1239.790130] hfs: unable to parse mount options [ 1239.821719] FAULT_INJECTION: forcing a failure. [ 1239.821719] name failslab, interval 1, probability 0, space 0, times 0 [ 1239.845764] CPU: 0 PID: 9164 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1239.853636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.863137] Call Trace: [ 1239.865753] dump_stack+0x188/0x20d [ 1239.869412] should_fail.cold+0xa/0x1b [ 1239.873329] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1239.878474] __should_failslab+0x115/0x180 [ 1239.882746] should_failslab+0x5/0xf [ 1239.886474] kmem_cache_alloc_node_trace+0x272/0x750 [ 1239.891599] __kmalloc_node_track_caller+0x38/0x70 [ 1239.896547] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1239.901236] __alloc_skb+0xef/0x5b0 [ 1239.904877] ? skb_trim+0x180/0x180 [ 1239.908517] ? tc_del_tfilter+0xd40/0xd40 [ 1239.912684] netlink_ack+0x234/0xa60 [ 1239.916413] ? netlink_sendmsg+0xcd0/0xcd0 [ 1239.920659] ? __copy_skb_header+0x2f0/0x510 [ 1239.925089] ? SOFTIRQ_verbose+0x10/0x10 [ 1239.929167] netlink_rcv_skb+0x33e/0x410 [ 1239.933245] ? rtnetlink_put_metrics+0x520/0x520 [ 1239.938016] ? netlink_ack+0xa60/0xa60 [ 1239.941932] netlink_unicast+0x4d7/0x6a0 [ 1239.946008] ? netlink_attachskb+0x710/0x710 [ 1239.950433] netlink_sendmsg+0x80b/0xcd0 [ 1239.954512] ? netlink_unicast+0x6a0/0x6a0 [ 1239.958751] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1239.963971] ? netlink_unicast+0x6a0/0x6a0 [ 1239.968219] sock_sendmsg+0xcf/0x120 [ 1239.971951] ___sys_sendmsg+0x3e2/0x920 [ 1239.976054] ? copy_msghdr_from_user+0x410/0x410 [ 1239.980827] ? __fget+0x319/0x510 [ 1239.984308] ? lock_downgrade+0x740/0x740 [ 1239.988474] ? check_preemption_disabled+0x41/0x280 [ 1239.993519] ? __fget+0x340/0x510 [ 1239.996994] ? iterate_fd+0x350/0x350 [ 1240.000814] ? perf_trace_lock+0xeb/0x4c0 [ 1240.004976] ? get_pid_task+0xf4/0x190 [ 1240.008884] ? __fget_light+0x1d1/0x230 [ 1240.012877] __sys_sendmmsg+0x195/0x470 [ 1240.016870] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1240.021211] ? lock_downgrade+0x740/0x740 [ 1240.025384] ? __mutex_unlock_slowpath+0xea/0x670 [ 1240.030252] ? check_preemption_disabled+0x41/0x280 [ 1240.035291] ? wait_for_completion+0x3c0/0x3c0 [ 1240.039892] ? vfs_write+0x15b/0x550 [ 1240.043625] ? ksys_write+0x1c8/0x2a0 [ 1240.047442] ? __ia32_sys_read+0xb0/0xb0 [ 1240.051520] ? __ia32_sys_clock_settime+0x260/0x260 [ 1240.056551] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1240.061331] __x64_sys_sendmmsg+0x99/0x100 [ 1240.065579] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1240.070177] do_syscall_64+0xf9/0x620 [ 1240.073990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1240.079189] RIP: 0033:0x45c799 [ 1240.082394] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1240.101480] RSP: 002b:00007fefbf376c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1240.109200] RAX: ffffffffffffffda RBX: 00007fefbf3776d4 RCX: 000000000045c799 [ 1240.116478] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1240.123751] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1240.131029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1240.138306] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 000000000000000b 10:42:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x5865}, 0x0) 10:42:06 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:06 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_LINK={0x8}, @GTPA_VERSION={0x8}]}, 0x2c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="69a548963661503853ac1c85a5f3c5b2a4c45032c00614fe741f6789ad7344959fbe197cfe616647a8e68e2ab9266ef683211cb65c2e3d2aef59d2f2a414ddbb57eec0f17a02cec14a81", 0x4a, 0x4, &(0x7f00000005c0)={0xa, 0x4e24, 0xff, @loopback, 0x9}, 0x1c) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r6, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x64, r9, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r8}, {0x48, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}]}, 0x64}}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000680)=0x14, 0x1800) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x2812, r10, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000bc0)={'ip6erspan0\x00'}) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r14, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r15 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r15, 0x107, 0x1, &(0x7f0000000280)={r14, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r14}}, 0x20}}, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r19, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r20 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r20, 0x107, 0x1, &(0x7f0000000280)={r19, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r16, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r19, 0x1020, 0x4000}}, 0x20}, 0x1, 0x0, 0x0, 0x240000c0}, 0x0) r21 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r21, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r21, 0x29, 0x23, &(0x7f0000000c00)={{{@in=@initdev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) r22 = socket$netlink(0x10, 0x3, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r25, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r26 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r26, 0x107, 0x1, &(0x7f0000000280)={r25, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r22, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r25}}, 0x20}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r27, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r28 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r28, 0x107, 0x1, &(0x7f0000000280)={r27, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001100010000000000000000000000007a", @ANYRES32=r27, @ANYBLOB="353c11c165d20ca9"], 0x20}}, 0x0) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_VERSION={0x8}, @GTPA_LINK={0x8, 0x1, r27}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x800) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x3b8) r29 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcsa\x00', 0x408080, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r29, 0xae44, 0x7ff) 10:42:06 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x1b, "420fb942"}}]}) 10:42:06 executing program 2 (fault-call:10 fault-nth:12): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1240.205707] x_tables: duplicate underflow at hook 2 [ 1240.217209] hfs: unable to parse mount options [ 1240.239044] team0: No ports can be present during mode change 10:42:07 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x1000000000000000) [ 1240.267131] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1240.284307] hfs: unable to parse mount options 10:42:07 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x1c, "420fb942"}}]}) [ 1240.359293] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1240.399932] hfs: unable to parse mount options 10:42:07 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x2, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1240.447297] hfs: unable to parse mount options [ 1240.452109] device veth1761 entered promiscuous mode [ 1240.468049] device veth1167 entered promiscuous mode [ 1240.476280] FAULT_INJECTION: forcing a failure. [ 1240.476280] name failslab, interval 1, probability 0, space 0, times 0 [ 1240.499772] device veth1167 left promiscuous mode [ 1240.508295] CPU: 0 PID: 9287 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1240.516114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.525481] Call Trace: [ 1240.528089] dump_stack+0x188/0x20d [ 1240.531741] should_fail.cold+0xa/0x1b [ 1240.535649] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1240.540784] __should_failslab+0x115/0x180 [ 1240.545032] should_failslab+0x5/0xf [ 1240.548761] kmem_cache_alloc_node+0x260/0x730 [ 1240.553481] ? tc_del_tfilter+0xd40/0xd40 [ 1240.557647] ? netdev_run_todo+0x50b/0x740 [ 1240.561902] __alloc_skb+0xba/0x5b0 [ 1240.565548] ? skb_trim+0x180/0x180 [ 1240.569192] ? tc_del_tfilter+0xd40/0xd40 [ 1240.573354] netlink_ack+0x234/0xa60 [ 1240.577085] ? netlink_sendmsg+0xcd0/0xcd0 [ 1240.581329] ? __copy_skb_header+0x2f0/0x510 [ 1240.585772] ? SOFTIRQ_verbose+0x10/0x10 [ 1240.589853] netlink_rcv_skb+0x33e/0x410 [ 1240.593939] ? rtnetlink_put_metrics+0x520/0x520 [ 1240.598728] ? netlink_ack+0xa60/0xa60 [ 1240.602772] netlink_unicast+0x4d7/0x6a0 [ 1240.606861] ? netlink_attachskb+0x710/0x710 [ 1240.611299] netlink_sendmsg+0x80b/0xcd0 [ 1240.615390] ? netlink_unicast+0x6a0/0x6a0 [ 1240.619645] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1240.624860] ? netlink_unicast+0x6a0/0x6a0 [ 1240.629105] sock_sendmsg+0xcf/0x120 [ 1240.632833] ___sys_sendmsg+0x3e2/0x920 [ 1240.636825] ? copy_msghdr_from_user+0x410/0x410 [ 1240.641613] ? __fget+0x319/0x510 [ 1240.645088] ? lock_downgrade+0x740/0x740 [ 1240.649247] ? check_preemption_disabled+0x41/0x280 [ 1240.654287] ? __fget+0x340/0x510 [ 1240.657752] ? iterate_fd+0x350/0x350 [ 1240.661568] ? perf_trace_lock+0xeb/0x4c0 [ 1240.665729] ? get_pid_task+0xf4/0x190 [ 1240.669632] ? __fget_light+0x1d1/0x230 [ 1240.673623] __sys_sendmmsg+0x195/0x470 [ 1240.677609] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1240.681943] ? lock_downgrade+0x740/0x740 [ 1240.686112] ? __mutex_unlock_slowpath+0xea/0x670 [ 1240.690968] ? check_preemption_disabled+0x41/0x280 [ 1240.695993] ? wait_for_completion+0x3c0/0x3c0 10:42:07 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x3, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1240.700586] ? vfs_write+0x15b/0x550 [ 1240.704318] ? ksys_write+0x1c8/0x2a0 [ 1240.708133] ? __ia32_sys_read+0xb0/0xb0 [ 1240.712208] ? __ia32_sys_clock_settime+0x260/0x260 [ 1240.717245] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1240.722017] __x64_sys_sendmmsg+0x99/0x100 [ 1240.726260] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1240.730854] do_syscall_64+0xf9/0x620 [ 1240.734669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1240.739865] RIP: 0033:0x45c799 [ 1240.743073] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1240.761979] RSP: 002b:00007fefbf355c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1240.769699] RAX: ffffffffffffffda RBX: 00007fefbf3566d4 RCX: 000000000045c799 [ 1240.776973] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1240.784248] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1240.791525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 10:42:07 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x1d, "420fb942"}}]}) [ 1240.798803] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 000000000000000c [ 1240.817469] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1240.850008] hfs: unable to parse mount options [ 1240.879944] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1240.900913] hfs: unable to parse mount options [ 1240.934609] device veth1765 entered promiscuous mode 10:42:07 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x1e, "420fb942"}}]}) [ 1240.958280] device veth1763 entered promiscuous mode 10:42:07 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x3f00000000000000) [ 1240.985469] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1241.048356] hfs: unable to parse mount options [ 1241.082470] device veth1767 entered promiscuous mode [ 1241.091529] device veth1767 left promiscuous mode [ 1241.106404] hfs: unable to parse mount options 10:42:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 10:42:07 executing program 2 (fault-call:10 fault-nth:13): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1241.149211] device veth1761 left promiscuous mode [ 1241.239239] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1241.270151] device veth1765 left promiscuous mode [ 1241.278266] device veth1167 entered promiscuous mode [ 1241.284399] FAULT_INJECTION: forcing a failure. [ 1241.284399] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.295713] device veth1763 left promiscuous mode [ 1241.304854] device veth1167 left promiscuous mode [ 1241.310442] CPU: 1 PID: 9514 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1241.318277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.327667] Call Trace: [ 1241.330282] dump_stack+0x188/0x20d [ 1241.333924] should_fail.cold+0xa/0x1b [ 1241.337827] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1241.342955] __should_failslab+0x115/0x180 [ 1241.347209] should_failslab+0x5/0xf [ 1241.350932] kmem_cache_alloc_node_trace+0x272/0x750 [ 1241.356083] __kmalloc_node_track_caller+0x38/0x70 [ 1241.361238] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1241.365926] __alloc_skb+0xef/0x5b0 [ 1241.369570] ? skb_trim+0x180/0x180 [ 1241.373214] ? tc_del_tfilter+0xd40/0xd40 [ 1241.377383] netlink_ack+0x234/0xa60 [ 1241.381113] ? netdev_pick_tx+0x2f0/0x2f0 [ 1241.385296] ? netlink_sendmsg+0xcd0/0xcd0 [ 1241.389540] ? __copy_skb_header+0x2f0/0x510 [ 1241.393957] ? sock_spd_release+0x270/0x270 [ 1241.398294] netlink_rcv_skb+0x33e/0x410 [ 1241.402371] ? rtnetlink_put_metrics+0x520/0x520 [ 1241.407141] ? netlink_ack+0xa60/0xa60 [ 1241.411052] netlink_unicast+0x4d7/0x6a0 [ 1241.415126] ? netlink_attachskb+0x710/0x710 [ 1241.419556] netlink_sendmsg+0x80b/0xcd0 [ 1241.423655] ? netlink_unicast+0x6a0/0x6a0 [ 1241.427896] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1241.433102] ? netlink_unicast+0x6a0/0x6a0 [ 1241.437347] sock_sendmsg+0xcf/0x120 [ 1241.441084] ___sys_sendmsg+0x3e2/0x920 [ 1241.445067] ? copy_msghdr_from_user+0x410/0x410 [ 1241.449877] ? __fget+0x319/0x510 [ 1241.453350] ? lock_downgrade+0x740/0x740 [ 1241.457599] ? check_preemption_disabled+0x41/0x280 [ 1241.462626] ? __fget+0x340/0x510 [ 1241.466088] ? iterate_fd+0x350/0x350 [ 1241.469898] ? get_pid_task+0xf4/0x190 [ 1241.473792] ? __fget_light+0x1d1/0x230 [ 1241.477779] __sys_sendmmsg+0x195/0x470 [ 1241.481764] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1241.486096] ? lock_downgrade+0x740/0x740 [ 1241.490264] ? __mutex_unlock_slowpath+0xea/0x670 [ 1241.495118] ? check_preemption_disabled+0x41/0x280 [ 1241.500142] ? wait_for_completion+0x3c0/0x3c0 [ 1241.504734] ? vfs_write+0x15b/0x550 [ 1241.508463] ? ksys_write+0x1c8/0x2a0 [ 1241.512278] ? __ia32_sys_read+0xb0/0xb0 [ 1241.516370] ? __ia32_sys_clock_settime+0x260/0x260 [ 1241.521426] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1241.526200] __x64_sys_sendmmsg+0x99/0x100 [ 1241.530453] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1241.535045] do_syscall_64+0xf9/0x620 [ 1241.538861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1241.544058] RIP: 0033:0x45c799 [ 1241.547271] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1241.566190] RSP: 002b:00007fefbf397c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1241.573912] RAX: ffffffffffffffda RBX: 00007fefbf3986d4 RCX: 000000000045c799 [ 1241.581192] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1241.588472] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1241.595751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1241.603028] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 000000000000000d [ 1241.685256] team0: No ports can be present during mode change [ 1241.739205] device veth1767 entered promiscuous mode [ 1241.776653] device veth1167 entered promiscuous mode [ 1241.783807] device veth1167 left promiscuous mode [ 1241.887404] device veth1767 left promiscuous mode 10:42:08 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xe8, 0xe8, 0x1b8, 0x0, 0x1b8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@ipv4={[], [], @loopback}, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:08 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x4, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:08 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x4000000000000000) 10:42:08 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x21, "420fb942"}}]}) 10:42:08 executing program 2 (fault-call:10 fault-nth:14): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) 10:42:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 1242.134424] hfs: unable to parse mount options [ 1242.205789] FAULT_INJECTION: forcing a failure. [ 1242.205789] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.217340] device veth1167 entered promiscuous mode [ 1242.224074] hfs: unable to parse mount options [ 1242.236607] CPU: 1 PID: 9531 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1242.244433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.253805] Call Trace: [ 1242.256416] dump_stack+0x188/0x20d [ 1242.260076] should_fail.cold+0xa/0x1b [ 1242.263983] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1242.269105] ? find_held_lock+0x2d/0x110 [ 1242.273200] ? sk_filter_trim_cap+0x366/0x8b0 [ 1242.277741] __should_failslab+0x115/0x180 [ 1242.281988] should_failslab+0x5/0xf [ 1242.285707] kmem_cache_alloc+0x44/0x710 [ 1242.289779] ? lock_acquire+0x170/0x400 [ 1242.293765] ? netlink_deliver_tap+0x146/0xb90 [ 1242.298449] skb_clone+0x14f/0x3d0 [ 1242.302002] netlink_deliver_tap+0x959/0xb90 [ 1242.306429] __netlink_sendskb+0x61/0xc0 [ 1242.310502] netlink_unicast+0x5b5/0x6a0 [ 1242.314585] ? netlink_attachskb+0x710/0x710 [ 1242.319150] ? skb_put+0x169/0x1c0 [ 1242.322737] ? memset+0x20/0x40 [ 1242.326036] ? __nlmsg_put+0x14b/0x1b0 [ 1242.329945] netlink_ack+0x5e2/0xa60 [ 1242.333695] ? netlink_sendmsg+0xcd0/0xcd0 [ 1242.337936] ? __copy_skb_header+0x2f0/0x510 [ 1242.342359] ? SOFTIRQ_verbose+0x10/0x10 [ 1242.346559] netlink_rcv_skb+0x33e/0x410 [ 1242.350677] ? rtnetlink_put_metrics+0x520/0x520 [ 1242.355458] ? netlink_ack+0xa60/0xa60 [ 1242.359385] netlink_unicast+0x4d7/0x6a0 [ 1242.363468] ? netlink_attachskb+0x710/0x710 [ 1242.367911] netlink_sendmsg+0x80b/0xcd0 [ 1242.371991] ? netlink_unicast+0x6a0/0x6a0 [ 1242.376233] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1242.381480] ? netlink_unicast+0x6a0/0x6a0 [ 1242.385746] sock_sendmsg+0xcf/0x120 [ 1242.389487] ___sys_sendmsg+0x3e2/0x920 [ 1242.393482] ? copy_msghdr_from_user+0x410/0x410 [ 1242.398250] ? __fget+0x319/0x510 [ 1242.401724] ? lock_downgrade+0x740/0x740 [ 1242.405887] ? check_preemption_disabled+0x41/0x280 [ 1242.410923] ? __fget+0x340/0x510 [ 1242.414393] ? iterate_fd+0x350/0x350 [ 1242.418213] ? perf_trace_lock+0xeb/0x4c0 [ 1242.422371] ? get_pid_task+0xf4/0x190 [ 1242.426267] ? __fget_light+0x1d1/0x230 [ 1242.430260] __sys_sendmmsg+0x195/0x470 [ 1242.434247] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1242.438579] ? lock_downgrade+0x740/0x740 [ 1242.442750] ? __mutex_unlock_slowpath+0xea/0x670 [ 1242.447607] ? check_preemption_disabled+0x41/0x280 [ 1242.452631] ? wait_for_completion+0x3c0/0x3c0 [ 1242.457221] ? vfs_write+0x15b/0x550 [ 1242.460950] ? ksys_write+0x1c8/0x2a0 [ 1242.464777] ? __ia32_sys_read+0xb0/0xb0 [ 1242.468862] ? __ia32_sys_clock_settime+0x260/0x260 [ 1242.473906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1242.478673] __x64_sys_sendmmsg+0x99/0x100 [ 1242.482917] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1242.487507] do_syscall_64+0xf9/0x620 [ 1242.491315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1242.496509] RIP: 0033:0x45c799 [ 1242.499708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1242.518623] RSP: 002b:00007fefbf397c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1242.526347] RAX: ffffffffffffffda RBX: 00007fefbf3986d4 RCX: 000000000045c799 [ 1242.533624] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1242.540899] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1242.548194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 10:42:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x3b8) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v2={0x5, 0x1, 0x2, 0x2, 0xc2, "4301a2e17546204452369e133bff823794563b90872f10ff00ef929eed6af0857a28dab9dcea8a39b1255d36c861933ef0f91e764fa9fbea8277f45bf58732c80bc379406325bd648cbd76c41d13599fc42b34ec884d95772eb2994641435748b6a9e035a804cc22425ad616a56bc9538912b3aef1e40729a7840ca69e419f9d3b07043a7e49ebc95120beaf69fa4d3b194a6161263aea2b47c7c1ac1939b17affac3c52c10b4decb7cc1f1e5edad289131e13fd2c0684ea0bf499b23d9514ed3521"}, 0xcb, 0x0) 10:42:09 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x5, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1242.555555] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 000000000000000e [ 1242.570104] device veth1167 left promiscuous mode 10:42:09 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x22, "420fb942"}}]}) 10:42:09 executing program 2 (fault-call:10 fault-nth:15): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) 10:42:09 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x6000000000000000) [ 1242.680072] nla_parse: 5 callbacks suppressed [ 1242.680082] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1242.683292] hfs: unable to parse mount options [ 1242.768983] hfs: unable to parse mount options [ 1242.782900] device veth1167 entered promiscuous mode 10:42:09 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x23, "420fb942"}}]}) [ 1242.819524] device veth1167 left promiscuous mode [ 1242.886645] hfs: unable to parse mount options 10:42:09 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x6, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1242.927542] FAULT_INJECTION: forcing a failure. [ 1242.927542] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.948154] hfs: unable to parse mount options [ 1242.965441] CPU: 0 PID: 9756 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1242.973275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.982634] Call Trace: [ 1242.985247] dump_stack+0x188/0x20d [ 1242.988900] should_fail.cold+0xa/0x1b [ 1242.992808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1242.997938] __should_failslab+0x115/0x180 [ 1243.002191] should_failslab+0x5/0xf [ 1243.005922] kmem_cache_alloc_node+0x260/0x730 [ 1243.010518] ? _copy_from_user+0xd2/0x140 [ 1243.014679] ? rw_copy_check_uvector+0x2a3/0x330 [ 1243.019539] __alloc_skb+0xba/0x5b0 [ 1243.023204] ? skb_trim+0x180/0x180 10:42:09 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010029bd7000fddbdf25060000000c000f007f6bba4c30000000050014001f000000060003000900000008001900e0000001080009000100000005000600010000000c000f000800000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008000) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x103) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r5, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r7, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x30, r7, 0x300, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) ioctl$RTC_WIE_ON(r3, 0x700f) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x43, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000001000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000004a6000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f627269646765000000000000000000000000641b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000083540d57e394dbfe8d8d09cf63c16fee512e52849a0c59e17f7a64bf4601ecca2756dfe26b5076587a5ce508d68431f10640f3139909af9fae143e707ef83695a6752f831f83aaaff369547313771118c8de925ca1c16c8305e3fce9c4bdb417"], 0x3b8) [ 1243.026859] netlink_sendmsg+0x8d6/0xcd0 [ 1243.030941] ? netlink_unicast+0x6a0/0x6a0 [ 1243.035186] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1243.040398] ? netlink_unicast+0x6a0/0x6a0 [ 1243.044646] sock_sendmsg+0xcf/0x120 [ 1243.048379] ___sys_sendmsg+0x3e2/0x920 [ 1243.052371] ? copy_msghdr_from_user+0x410/0x410 [ 1243.057144] ? check_preemption_disabled+0x41/0x280 [ 1243.062171] ? perf_trace_lock+0xeb/0x4c0 [ 1243.066364] ? lock_downgrade+0x740/0x740 [ 1243.070535] ? SOFTIRQ_verbose+0x10/0x10 10:42:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x6800}, 0x0) [ 1243.074619] ? find_held_lock+0x2d/0x110 [ 1243.078691] ? __might_fault+0x11f/0x1d0 [ 1243.082772] ? lock_downgrade+0x740/0x740 [ 1243.086943] __sys_sendmmsg+0x195/0x470 [ 1243.090934] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1243.095269] ? lock_downgrade+0x740/0x740 [ 1243.099447] ? __mutex_unlock_slowpath+0xea/0x670 [ 1243.104307] ? check_preemption_disabled+0x41/0x280 [ 1243.109338] ? wait_for_completion+0x3c0/0x3c0 [ 1243.113940] ? vfs_write+0x15b/0x550 [ 1243.117665] ? ksys_write+0x1c8/0x2a0 [ 1243.121479] ? __ia32_sys_read+0xb0/0xb0 10:42:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0xe8, 0xe8, 0xe8, 0xe8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [0x0, 0x0, 0x0, 0x2fbd0c31b50a3b85], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x161002, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000000)={0x0, 0x1}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x18800, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f0000000080)={0x8, 0x2c7, 0x6, 0x9, 0xf, 0x5a}) [ 1243.125561] ? __ia32_sys_clock_settime+0x260/0x260 [ 1243.130599] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1243.135373] __x64_sys_sendmmsg+0x99/0x100 [ 1243.139621] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1243.144220] do_syscall_64+0xf9/0x620 [ 1243.148039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1243.153241] RIP: 0033:0x45c799 [ 1243.156443] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1243.170915] audit: type=1400 audit(1584096129.832:274): avc: denied { map } for pid=9762 comm="syz-executor.4" path="/dev/null" dev="devtmpfs" ino=17082 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:null_device_t:s0 tclass=chr_file permissive=1 [ 1243.175355] RSP: 002b:00007fefbf355c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1243.175370] RAX: ffffffffffffffda RBX: 00007fefbf3566d4 RCX: 000000000045c799 [ 1243.175377] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1243.175386] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1243.175393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1243.175401] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 000000000000000f 10:42:10 executing program 2 (fault-call:10 fault-nth:16): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) 10:42:10 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x7, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:10 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x24, "420fb942"}}]}) 10:42:10 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x6558000000000000) [ 1243.340698] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1243.382786] hfs: unable to parse mount options 10:42:10 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x25, "420fb942"}}]}) [ 1243.423661] device veth1167 entered promiscuous mode [ 1243.437427] hfs: unable to parse mount options [ 1243.449268] device veth1167 left promiscuous mode 10:42:10 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="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", 0xff, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r1, 0xa7, 0x49}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'streebog512\x00'}}, &(0x7f0000000240)="af4079437d7d793bf096b885bf710fe629de58396e0a93f7e6572dfbc39108a65174917287606c56b2a6689ac9ad70eb534dca03bf0b6733310d0346a41773fb1b6aba314a833dac3c098cc3b59b4e0c4f1f13515d673fbaf60f7f33a63396c02ff811df1eb47556416f43a07382308f727f807d2e890e81282c82b51c3fb79e36d6a210d65d9348fe8fafd3b691f21cf7c120d94b7ad3189a2c9373354de233ab797691abdf31", &(0x7f0000000300)=""/73) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f00000001c0)={{0x32, @empty, 0x0, 0x0, 'none\x00'}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7b2d3f17}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$binfmt_elf64(r3, &(0x7f0000000400)=ANY=[], 0xffffffa8) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f00000001c0)={{0x87, @empty, 0x0, 0x0, 'none\x00', 0x1b}, {@broadcast, 0x0, 0x0, 0x0, 0x0, 0x7b2d3f17}}, 0xffffffffffffff0a) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f00000009c0), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[], 0xffffffa8) setsockopt$inet_opts(r2, 0x0, 0x16, &(0x7f0000000380)="5adc41c1bbb3f63276c5a2b3026e9f84f4f0aec707d8b3ca653f1fa31f40f6118811b9690d8b1caec4480497ec85bfbd4f3843bec35d94bc5def3e61747d7690083e5a02aa6a88291682474eb9c923ba6e247066dfa08cf3a20ae7ac74e45fe22247f9f6d6f6c1147db63a93e9e85e59603833bdc85d7c996f3ae5b5e60091ec0476", 0x82) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000580)=0xe8) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000000980)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r4}) 10:42:10 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0xa, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1243.548637] hfs: unable to parse mount options 10:42:10 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x8100000000000000) [ 1243.599511] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 [ 1243.614651] hfs: unable to parse mount options [ 1243.621761] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:10 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x26, "420fb942"}}]}) [ 1243.713265] device veth1167 entered promiscuous mode [ 1243.728367] device veth1167 left promiscuous mode [ 1243.744027] hfs: unable to parse mount options 10:42:10 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000001c0)={{0x32, @empty, 0x0, 0x0, 'none\x00'}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7b2d3f17}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0xffffffa8) setsockopt(r1, 0x1, 0x7, &(0x7f00000004c0)="1453f77b47557717191a97f1", 0xc) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000001000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe88000000000000000000000000932fafb8805c3479cbfa5e2cef781300015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000000000003b2800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c415353494659000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000edff000028000000000000000000000000000000000000000000000000364d3078afb21b69bf2e65aec245abe8c2402cd00bc5e5b2e7694bd52dae98cab1533d6907f31d06ef86b187ccc10cdbb498162c25534ba51101b53885875256aaf3de00d78c0872cb5967251e7c294c78e6b0c1de15c377f7c4822ee3892447a695d708ab856a607f5f15a65c4eed994ca6f8ef80c367bfb6e399397bdbf27a2cb1d708879e3688d27380e981af0c82458c712c2051832f63a6a6155e8bb4a5ad850cc8392fd5be69f1c2ea32d05b6bc09c6187697f35c86338a6d93d291f99dd945a4d292d2ccc2cbf4ad10000"], 0x3b8) [ 1243.791735] hfs: unable to parse mount options [ 1243.855248] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 [ 1243.906145] FAULT_INJECTION: forcing a failure. [ 1243.906145] name failslab, interval 1, probability 0, space 0, times 0 [ 1243.920708] CPU: 0 PID: 10111 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1243.928628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.938002] Call Trace: [ 1243.940636] dump_stack+0x188/0x20d [ 1243.944279] should_fail.cold+0xa/0x1b [ 1243.948180] ? __netlink_lookup+0x36e/0x700 [ 1243.952521] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1243.957653] __should_failslab+0x115/0x180 [ 1243.961899] should_failslab+0x5/0xf [ 1243.965617] kmem_cache_alloc+0x44/0x710 [ 1243.969692] ? lock_acquire+0x170/0x400 [ 1243.973679] ? netlink_deliver_tap+0x146/0xb90 [ 1243.978274] skb_clone+0x14f/0x3d0 [ 1243.981834] netlink_deliver_tap+0x959/0xb90 [ 1243.986267] netlink_unicast+0x547/0x6a0 [ 1243.990343] ? netlink_attachskb+0x710/0x710 [ 1243.994771] netlink_sendmsg+0x80b/0xcd0 [ 1243.998854] ? netlink_unicast+0x6a0/0x6a0 [ 1244.003098] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1244.008309] ? netlink_unicast+0x6a0/0x6a0 [ 1244.012549] sock_sendmsg+0xcf/0x120 [ 1244.016272] ___sys_sendmsg+0x3e2/0x920 [ 1244.020261] ? copy_msghdr_from_user+0x410/0x410 [ 1244.025033] ? mark_held_locks+0xf0/0xf0 [ 1244.029102] ? lock_downgrade+0x740/0x740 [ 1244.033259] ? check_preemption_disabled+0x41/0x280 [ 1244.038302] ? find_held_lock+0x2d/0x110 [ 1244.042372] ? __might_fault+0x11f/0x1d0 [ 1244.046449] ? lock_downgrade+0x740/0x740 [ 1244.050619] __sys_sendmmsg+0x195/0x470 [ 1244.054621] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1244.058955] ? lock_downgrade+0x740/0x740 [ 1244.063125] ? __mutex_unlock_slowpath+0xea/0x670 [ 1244.067985] ? check_preemption_disabled+0x41/0x280 [ 1244.073013] ? wait_for_completion+0x3c0/0x3c0 [ 1244.077609] ? vfs_write+0x15b/0x550 [ 1244.081335] ? ksys_write+0x1c8/0x2a0 [ 1244.085146] ? __ia32_sys_read+0xb0/0xb0 [ 1244.089214] ? __ia32_sys_clock_settime+0x260/0x260 [ 1244.094251] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1244.099020] __x64_sys_sendmmsg+0x99/0x100 [ 1244.103266] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1244.107858] do_syscall_64+0xf9/0x620 [ 1244.111669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1244.116863] RIP: 0033:0x45c799 [ 1244.120063] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1244.138992] RSP: 002b:00007fefbf355c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1244.146717] RAX: ffffffffffffffda RBX: 00007fefbf3566d4 RCX: 000000000045c799 10:42:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x6c00}, 0x0) 10:42:10 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x48, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1244.153997] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1244.161282] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1244.168564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1244.175847] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000010 10:42:11 executing program 2 (fault-call:10 fault-nth:17): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) 10:42:11 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x27, "420fb942"}}]}) 10:42:11 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x88a8ffff00000000) [ 1244.238761] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1244.296574] hfs: unable to parse mount options [ 1244.337353] device veth1167 entered promiscuous mode 10:42:11 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x4c, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1244.359430] hfs: unable to parse mount options [ 1244.400826] device veth1167 left promiscuous mode 10:42:11 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x28, "420fb942"}}]}) [ 1244.456934] FAULT_INJECTION: forcing a failure. [ 1244.456934] name failslab, interval 1, probability 0, space 0, times 0 [ 1244.493801] CPU: 0 PID: 10230 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1244.501745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1244.511112] Call Trace: [ 1244.513722] dump_stack+0x188/0x20d [ 1244.517379] should_fail.cold+0xa/0x1b [ 1244.521408] ? __netlink_lookup+0x36e/0x700 [ 1244.525752] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1244.530886] __should_failslab+0x115/0x180 [ 1244.535269] should_failslab+0x5/0xf [ 1244.538997] kmem_cache_alloc+0x44/0x710 [ 1244.543075] ? lock_acquire+0x170/0x400 [ 1244.547063] ? netlink_deliver_tap+0x146/0xb90 [ 1244.551658] skb_clone+0x14f/0x3d0 [ 1244.555218] netlink_deliver_tap+0x959/0xb90 [ 1244.559650] netlink_unicast+0x547/0x6a0 [ 1244.563733] ? netlink_attachskb+0x710/0x710 [ 1244.568162] netlink_sendmsg+0x80b/0xcd0 [ 1244.572242] ? netlink_unicast+0x6a0/0x6a0 [ 1244.576504] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1244.581891] ? netlink_unicast+0x6a0/0x6a0 [ 1244.586133] sock_sendmsg+0xcf/0x120 [ 1244.589863] ___sys_sendmsg+0x3e2/0x920 [ 1244.593850] ? copy_msghdr_from_user+0x410/0x410 [ 1244.598625] ? mark_held_locks+0xf0/0xf0 [ 1244.602694] ? lock_downgrade+0x740/0x740 [ 1244.606857] ? check_preemption_disabled+0x41/0x280 [ 1244.611898] ? find_held_lock+0x2d/0x110 [ 1244.615968] ? __might_fault+0x11f/0x1d0 [ 1244.620042] ? lock_downgrade+0x740/0x740 [ 1244.624213] __sys_sendmmsg+0x195/0x470 [ 1244.628201] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1244.632534] ? lock_downgrade+0x740/0x740 [ 1244.636731] ? __mutex_unlock_slowpath+0xea/0x670 [ 1244.641589] ? check_preemption_disabled+0x41/0x280 [ 1244.646613] ? wait_for_completion+0x3c0/0x3c0 [ 1244.651206] ? vfs_write+0x15b/0x550 [ 1244.654928] ? ksys_write+0x1c8/0x2a0 [ 1244.658740] ? __ia32_sys_read+0xb0/0xb0 [ 1244.662816] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1244.667583] __x64_sys_sendmmsg+0x99/0x100 [ 1244.671829] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1244.676419] do_syscall_64+0xf9/0x620 [ 1244.680236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1244.685428] RIP: 0033:0x45c799 [ 1244.688628] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1244.707537] RSP: 002b:00007fefbf397c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1244.715256] RAX: ffffffffffffffda RBX: 00007fefbf3986d4 RCX: 000000000045c799 [ 1244.722531] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1244.729805] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1244.737081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1244.744358] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000011 10:42:11 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x9effffff00000000) [ 1244.755289] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 [ 1244.762570] hfs: unable to parse mount options [ 1244.815588] hfs: unable to parse mount options 10:42:11 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x60, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:11 executing program 2 (fault-call:10 fault-nth:18): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1244.837714] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:11 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x29, "420fb942"}}]}) [ 1244.975412] device veth1167 entered promiscuous mode [ 1244.983706] device veth1167 left promiscuous mode 10:42:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="29658c80", @ANYRES16=r3, @ANYBLOB="8d05000000000000000004000000"], 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, r3, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x400}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4000) connect$nfc_raw(r1, &(0x7f0000000980)={0x27, 0x0, 0x1, 0x6}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007068040000680400008904000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000000052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) r5 = dup3(r0, r4, 0x80000) ioctl$KVM_SET_GSI_ROUTING(r5, 0x4008ae6a, &(0x7f0000000080)={0x4, 0x0, [{0x8000, 0x3, 0x0, 0x0, @adapter={0x1, 0x4463, 0xd26, 0x401, 0x9}}, {0x4f, 0x3, 0x0, 0x0, @irqchip={0x0, 0x2}}, {0x1, 0x4, 0x0, 0x0, @adapter={0x6, 0x9, 0x7, 0x4, 0xbe}}, {0x7ff, 0x4, 0x0, 0x0, @sint={0x1, 0x7fffffff}}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) [ 1245.039890] hfs: unable to parse mount options 10:42:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x7400}, 0x0) 10:42:11 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x68, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1245.128812] FAULT_INJECTION: forcing a failure. [ 1245.128812] name failslab, interval 1, probability 0, space 0, times 0 [ 1245.159756] hfs: unable to parse mount options [ 1245.186856] CPU: 0 PID: 10399 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1245.194784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1245.204149] Call Trace: [ 1245.206763] dump_stack+0x188/0x20d [ 1245.210415] should_fail.cold+0xa/0x1b [ 1245.214325] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1245.219443] ? __lock_is_held+0xad/0x140 [ 1245.223532] __should_failslab+0x115/0x180 [ 1245.227892] should_failslab+0x5/0xf [ 1245.231620] kmem_cache_alloc_node_trace+0x272/0x750 [ 1245.236748] __kmalloc_node+0x38/0x70 [ 1245.240564] qdisc_alloc+0xb6/0xa40 [ 1245.244206] ? do_raw_read_unlock+0x3b/0x70 [ 1245.248543] ? _raw_read_unlock+0x29/0x40 [ 1245.252705] qdisc_create+0xdc/0x1170 [ 1245.256523] ? tc_get_qdisc+0xa90/0xa90 [ 1245.260516] ? nla_parse+0x1f3/0x2f0 [ 1245.264242] tc_modify_qdisc+0x4bd/0x1929 [ 1245.268415] ? qdisc_create+0x1170/0x1170 [ 1245.272577] ? mutex_trylock+0x1a0/0x1a0 [ 1245.276657] ? qdisc_create+0x1170/0x1170 [ 1245.280816] rtnetlink_rcv_msg+0x453/0xaf0 [ 1245.285065] ? rtnetlink_put_metrics+0x520/0x520 [ 1245.289835] ? lock_downgrade+0x740/0x740 [ 1245.294006] ? __lock_is_held+0xad/0x140 [ 1245.298085] ? _raw_spin_unlock_irqrestore+0x67/0xe0 [ 1245.303212] netlink_rcv_skb+0x160/0x410 [ 1245.307295] ? rtnetlink_put_metrics+0x520/0x520 [ 1245.312068] ? netlink_ack+0xa60/0xa60 [ 1245.315981] netlink_unicast+0x4d7/0x6a0 [ 1245.320216] ? netlink_attachskb+0x710/0x710 [ 1245.324658] netlink_sendmsg+0x80b/0xcd0 [ 1245.328738] ? netlink_unicast+0x6a0/0x6a0 [ 1245.332993] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1245.338209] ? netlink_unicast+0x6a0/0x6a0 [ 1245.342460] sock_sendmsg+0xcf/0x120 [ 1245.346185] ___sys_sendmsg+0x3e2/0x920 [ 1245.350180] ? copy_msghdr_from_user+0x410/0x410 [ 1245.354960] ? mark_held_locks+0xf0/0xf0 [ 1245.359031] ? lock_downgrade+0x740/0x740 [ 1245.363197] ? check_preemption_disabled+0x41/0x280 [ 1245.368231] ? find_held_lock+0x2d/0x110 [ 1245.372323] ? __might_fault+0x11f/0x1d0 [ 1245.376397] ? lock_downgrade+0x740/0x740 [ 1245.380651] __sys_sendmmsg+0x195/0x470 [ 1245.384639] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1245.389047] ? lock_downgrade+0x740/0x740 [ 1245.393226] ? __mutex_unlock_slowpath+0xea/0x670 [ 1245.398190] ? check_preemption_disabled+0x41/0x280 [ 1245.403228] ? wait_for_completion+0x3c0/0x3c0 [ 1245.407833] ? vfs_write+0x15b/0x550 [ 1245.411556] ? ksys_write+0x1c8/0x2a0 [ 1245.415358] ? __ia32_sys_read+0xb0/0xb0 [ 1245.419432] ? __ia32_sys_clock_settime+0x260/0x260 [ 1245.424466] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1245.429242] __x64_sys_sendmmsg+0x99/0x100 [ 1245.433493] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1245.438088] do_syscall_64+0xf9/0x620 [ 1245.441902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1245.447095] RIP: 0033:0x45c799 [ 1245.450296] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1245.469204] RSP: 002b:00007fefbf397c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1245.476921] RAX: ffffffffffffffda RBX: 00007fefbf3986d4 RCX: 000000000045c799 10:42:12 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0xaa11000000000000) [ 1245.484196] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1245.491478] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1245.498772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1245.506050] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000012 10:42:12 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x2a, "420fb942"}}]}) 10:42:12 executing program 4: lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000a00)='y\x00', 0x2, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x0, 0x1b8, 0x0, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x0, {0x2}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000140)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000540)={r4, 0x88, &(0x7f0000000480)=[@in6={0xa, 0x4e23, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}, 0x80}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x37}}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x9, @empty, 0x1}]}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000980)={r5, 0x7, 0x4, [0x8, 0x7, 0x4, 0x1]}, &(0x7f00000009c0)=0x10) eventfd(0x9) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000400)={&(0x7f00000000c0)="bb6cc06dd2c4f31877ef73df1eaa27fc31d1f56dae1ddf014f426072b3ba0b3debdc4562d92e85ed31f56dccb6e2294d0c", &(0x7f0000000100)=""/220, &(0x7f0000000200)="a324a9e7068d3527fe0d4f410541fb0edce3c5d1fcfa8c154b15b6f9b2d5bb1f538cd80fa2eee3b1186bd83e9e4e607f146e057fa91d4aa2617f68546f0762cb5d30d33c757da4f2f45c9b4e5aceaf", &(0x7f0000000280)="db6ce4e586674ce288f4ce3ac52f4fd0210bd5f6e83fc89208a74031f14101fabaef92a0bbb0138bd3aa671c856f893a30bbd537949850e5fe22edc2aeac8f56d6d950e18b37abb0aa127ab01ddcfe475ac8b2780bfef0792705b6fac6dcf6cae7682fe2633cfa36eade937b434ae5f6a692a75d02dacf199343fe7416fb4dd870da4b96a1c065582dbe7591fe005fa476c213e00e44215c118bd5abb3260b1be83fe9793197b4f1873c7cca1bf12254cb3f5b126a2edd0da0c82535f49ea59014a2112e734046cd76aaec86153ee2e7f8bb6da5", 0x7, r6}, 0x38) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r7, 0x0) setsockopt$PNPIPE_HANDLE(r7, 0x113, 0x3, &(0x7f0000000440)=0x20, 0x4) 10:42:12 executing program 2 (fault-call:10 fault-nth:19): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1245.601037] hfs: unable to parse mount options [ 1245.603244] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:12 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x6c, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1245.667458] hfs: unable to parse mount options 10:42:12 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x2b, "420fb942"}}]}) 10:42:12 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000000)={0x0, 0x1, 0x7d957c2cf3a154cd, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:12 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0xf0ffffff00000000) [ 1245.804456] FAULT_INJECTION: forcing a failure. [ 1245.804456] name failslab, interval 1, probability 0, space 0, times 0 10:42:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x7a00}, 0x0) [ 1245.870452] CPU: 0 PID: 10578 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1245.878408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1245.887775] Call Trace: [ 1245.890384] dump_stack+0x188/0x20d [ 1245.894037] should_fail.cold+0xa/0x1b [ 1245.897945] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1245.903070] ? __lock_is_held+0xad/0x140 [ 1245.907156] __should_failslab+0x115/0x180 [ 1245.911402] should_failslab+0x5/0xf [ 1245.915117] kmem_cache_alloc_node_trace+0x272/0x750 [ 1245.920222] ? __debug_object_init+0x17d/0xac0 [ 1245.924818] __kmalloc_node+0x38/0x70 [ 1245.928628] kvmalloc_node+0x61/0xf0 [ 1245.932344] qdisc_class_hash_alloc+0x26/0xa0 [ 1245.936875] qdisc_class_hash_init+0x19/0x110 [ 1245.941376] ? qdisc_watchdog_init+0x20/0x80 [ 1245.945857] hfsc_init_qdisc+0xf9/0x410 [ 1245.949850] ? hfsc_reset_qdisc+0xd30/0xd30 [ 1245.954168] qdisc_create+0x556/0x1170 [ 1245.958076] ? tc_get_qdisc+0xa90/0xa90 [ 1245.962056] ? nla_parse+0x1f3/0x2f0 [ 1245.965769] tc_modify_qdisc+0x4bd/0x1929 [ 1245.969925] ? qdisc_create+0x1170/0x1170 [ 1245.974083] ? mutex_trylock+0x1a0/0x1a0 [ 1245.978172] ? qdisc_create+0x1170/0x1170 [ 1245.982317] rtnetlink_rcv_msg+0x453/0xaf0 [ 1245.986638] ? rtnetlink_put_metrics+0x520/0x520 [ 1245.991390] ? netdev_pick_tx+0x2f0/0x2f0 [ 1245.995533] ? __copy_skb_header+0x2f0/0x510 [ 1245.999939] ? sock_spd_release+0x270/0x270 [ 1246.004265] netlink_rcv_skb+0x160/0x410 [ 1246.008324] ? rtnetlink_put_metrics+0x520/0x520 [ 1246.013105] ? netlink_ack+0xa60/0xa60 [ 1246.017005] netlink_unicast+0x4d7/0x6a0 [ 1246.021154] ? netlink_attachskb+0x710/0x710 [ 1246.025565] netlink_sendmsg+0x80b/0xcd0 [ 1246.029630] ? netlink_unicast+0x6a0/0x6a0 [ 1246.033871] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1246.039080] ? netlink_unicast+0x6a0/0x6a0 [ 1246.043311] sock_sendmsg+0xcf/0x120 [ 1246.047033] ___sys_sendmsg+0x3e2/0x920 [ 1246.051006] ? copy_msghdr_from_user+0x410/0x410 [ 1246.055763] ? mark_held_locks+0xf0/0xf0 [ 1246.059815] ? lock_downgrade+0x740/0x740 [ 1246.063975] ? check_preemption_disabled+0x41/0x280 [ 1246.068994] ? find_held_lock+0x2d/0x110 [ 1246.073182] ? __might_fault+0x11f/0x1d0 [ 1246.077265] ? lock_downgrade+0x740/0x740 [ 1246.081535] __sys_sendmmsg+0x195/0x470 [ 1246.085537] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1246.089957] ? lock_downgrade+0x740/0x740 [ 1246.094124] ? __mutex_unlock_slowpath+0xea/0x670 [ 1246.098979] ? check_preemption_disabled+0x41/0x280 [ 1246.104008] ? wait_for_completion+0x3c0/0x3c0 [ 1246.108589] ? vfs_write+0x15b/0x550 [ 1246.112315] ? ksys_write+0x1c8/0x2a0 [ 1246.116118] ? __ia32_sys_read+0xb0/0xb0 [ 1246.120182] ? __ia32_sys_clock_settime+0x260/0x260 [ 1246.125220] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1246.129978] __x64_sys_sendmmsg+0x99/0x100 [ 1246.134216] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1246.138794] do_syscall_64+0xf9/0x620 [ 1246.142595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1246.147797] RIP: 0033:0x45c799 [ 1246.150995] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1246.169907] RSP: 002b:00007fefbf397c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1246.177624] RAX: ffffffffffffffda RBX: 00007fefbf3986d4 RCX: 000000000045c799 [ 1246.184899] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1246.192167] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1246.199444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1246.206733] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000013 10:42:12 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x74, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1246.225112] hfs: unable to parse mount options 10:42:13 executing program 2 (fault-call:10 fault-nth:20): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1246.261340] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1246.262255] hfs: unable to parse mount options 10:42:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0x6, 0x1, 0x2, 0x9, r3}, &(0x7f00000000c0)=0x10) 10:42:13 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x2c, "420fb942"}}]}) [ 1246.406238] device veth1167 entered promiscuous mode [ 1246.427049] hfs: unable to parse mount options [ 1246.447685] device veth1167 left promiscuous mode 10:42:13 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x7a, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1246.482124] hfs: unable to parse mount options 10:42:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000009000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) 10:42:13 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0xfcffffff00000000) 10:42:13 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x2d, "420fb942"}}]}) [ 1246.516536] FAULT_INJECTION: forcing a failure. [ 1246.516536] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.569079] CPU: 0 PID: 10744 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1246.577018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1246.586389] Call Trace: [ 1246.589000] dump_stack+0x188/0x20d [ 1246.592653] should_fail.cold+0xa/0x1b [ 1246.596567] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1246.601689] ? __lock_is_held+0xad/0x140 [ 1246.605779] __should_failslab+0x115/0x180 [ 1246.610030] should_failslab+0x5/0xf [ 1246.613758] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1246.618446] ? find_held_lock+0x2d/0x110 [ 1246.622522] ? fs_reclaim_acquire+0x10/0x10 [ 1246.626860] ? should_fail+0x142/0x7bc [ 1246.630763] tcf_block_get_ext+0x26a/0x1670 [ 1246.635099] ? tcf_net_init+0x340/0x340 [ 1246.639085] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1246.644142] ? kmem_cache_alloc_node_trace+0x34d/0x750 [ 1246.649446] ? __debug_object_init+0x17d/0xac0 [ 1246.654045] ? kasan_unpoison_shadow+0x30/0x40 [ 1246.658664] tcf_block_get+0xa9/0xf0 [ 1246.662411] ? tcf_block_get_ext+0x1670/0x1670 [ 1246.667017] ? blackhole_dequeue+0x10/0x10 [ 1246.671273] ? qdisc_class_hash_alloc+0x86/0xa0 [ 1246.675972] hfsc_init_qdisc+0x155/0x410 [ 1246.680143] ? hfsc_reset_qdisc+0xd30/0xd30 [ 1246.684485] qdisc_create+0x556/0x1170 [ 1246.688389] ? tc_get_qdisc+0xa90/0xa90 [ 1246.692373] ? nla_parse+0x1f3/0x2f0 [ 1246.696085] tc_modify_qdisc+0x4bd/0x1929 [ 1246.700234] ? qdisc_create+0x1170/0x1170 [ 1246.704501] ? mutex_trylock+0x1a0/0x1a0 [ 1246.708589] ? qdisc_create+0x1170/0x1170 [ 1246.712757] rtnetlink_rcv_msg+0x453/0xaf0 [ 1246.717006] ? rtnetlink_put_metrics+0x520/0x520 [ 1246.721775] ? netdev_pick_tx+0x2f0/0x2f0 [ 1246.725926] ? __copy_skb_header+0x2f0/0x510 [ 1246.730343] ? sock_spd_release+0x270/0x270 [ 1246.734679] netlink_rcv_skb+0x160/0x410 [ 1246.738753] ? rtnetlink_put_metrics+0x520/0x520 [ 1246.743525] ? netlink_ack+0xa60/0xa60 [ 1246.747438] netlink_unicast+0x4d7/0x6a0 [ 1246.751520] ? netlink_attachskb+0x710/0x710 [ 1246.755945] netlink_sendmsg+0x80b/0xcd0 [ 1246.760033] ? netlink_unicast+0x6a0/0x6a0 [ 1246.764273] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1246.769481] ? netlink_unicast+0x6a0/0x6a0 [ 1246.773720] sock_sendmsg+0xcf/0x120 [ 1246.777443] ___sys_sendmsg+0x3e2/0x920 [ 1246.781427] ? copy_msghdr_from_user+0x410/0x410 [ 1246.786199] ? mark_held_locks+0xf0/0xf0 [ 1246.790269] ? lock_downgrade+0x740/0x740 [ 1246.794433] ? check_preemption_disabled+0x41/0x280 [ 1246.799465] ? find_held_lock+0x2d/0x110 [ 1246.803534] ? __might_fault+0x11f/0x1d0 [ 1246.807611] ? lock_downgrade+0x740/0x740 [ 1246.811780] __sys_sendmmsg+0x195/0x470 [ 1246.815768] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1246.820100] ? lock_downgrade+0x740/0x740 [ 1246.824267] ? __mutex_unlock_slowpath+0xea/0x670 [ 1246.829121] ? check_preemption_disabled+0x41/0x280 [ 1246.834147] ? wait_for_completion+0x3c0/0x3c0 [ 1246.838742] ? vfs_write+0x15b/0x550 [ 1246.842467] ? ksys_write+0x1c8/0x2a0 [ 1246.846276] ? __ia32_sys_read+0xb0/0xb0 [ 1246.850366] ? __ia32_sys_clock_settime+0x260/0x260 [ 1246.855391] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1246.860161] __x64_sys_sendmmsg+0x99/0x100 [ 1246.864404] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1246.868995] do_syscall_64+0xf9/0x620 [ 1246.872815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1246.878016] RIP: 0033:0x45c799 [ 1246.881214] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1246.900129] RSP: 002b:00007fefbf397c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1246.907882] RAX: ffffffffffffffda RBX: 00007fefbf3986d4 RCX: 000000000045c799 [ 1246.915163] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1246.922438] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1246.929712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1246.936990] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000014 [ 1246.954947] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1246.967468] hfs: unable to parse mount options 10:42:13 executing program 2 (fault-call:10 fault-nth:21): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1247.017561] hfs: unable to parse mount options 10:42:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x8100}, 0x0) 10:42:13 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x140, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:13 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x43, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000010000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000080280052454a0000000019b5418c0000000000000000000000000000000000000000000000fe8800000000000000000000000000e8ff00000000000000000000000000003f000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d00000000000000000000000000000000000000000000000004568f8002800434c415353494659000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"/955], 0x3b8) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000100)={0x7}) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20010, r3, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000080)={r4, 0x18}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_settime(0x4, &(0x7f00000001c0)={r5, r6+10000000}) 10:42:13 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x2e, "420fb942"}}]}) 10:42:13 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0xffffff7f00000000) [ 1247.165506] x_tables: duplicate underflow at hook 2 [ 1247.189197] hfs: unable to parse mount options [ 1247.207214] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1247.238754] device veth1169 entered promiscuous mode [ 1247.240398] hfs: unable to parse mount options [ 1247.247385] FAULT_INJECTION: forcing a failure. [ 1247.247385] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.261892] CPU: 1 PID: 10948 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1247.269802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1247.279166] Call Trace: [ 1247.281776] dump_stack+0x188/0x20d [ 1247.285431] should_fail.cold+0xa/0x1b [ 1247.289344] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1247.294466] ? __lock_is_held+0xad/0x140 [ 1247.298570] __should_failslab+0x115/0x180 [ 1247.302817] should_failslab+0x5/0xf [ 1247.306545] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1247.311228] ? find_held_lock+0x2d/0x110 [ 1247.315300] ? fs_reclaim_acquire+0x10/0x10 [ 1247.320152] ? should_fail+0x142/0x7bc [ 1247.324056] tcf_block_get_ext+0x4eb/0x1670 [ 1247.328404] ? tcf_net_init+0x340/0x340 [ 1247.332389] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1247.337414] ? kmem_cache_alloc_node_trace+0x34d/0x750 [ 1247.342705] ? __debug_object_init+0x17d/0xac0 [ 1247.347309] ? kasan_unpoison_shadow+0x30/0x40 [ 1247.351912] tcf_block_get+0xa9/0xf0 [ 1247.355638] ? tcf_block_get_ext+0x1670/0x1670 [ 1247.360241] ? blackhole_dequeue+0x10/0x10 [ 1247.364501] ? qdisc_class_hash_alloc+0x86/0xa0 [ 1247.369191] hfsc_init_qdisc+0x155/0x410 [ 1247.373270] ? hfsc_reset_qdisc+0xd30/0xd30 [ 1247.377613] qdisc_create+0x556/0x1170 [ 1247.381532] ? tc_get_qdisc+0xa90/0xa90 [ 1247.385526] ? nla_parse+0x1f3/0x2f0 [ 1247.389255] tc_modify_qdisc+0x4bd/0x1929 [ 1247.393432] ? qdisc_create+0x1170/0x1170 [ 1247.397591] ? mutex_trylock+0x1a0/0x1a0 [ 1247.401685] ? qdisc_create+0x1170/0x1170 [ 1247.405846] rtnetlink_rcv_msg+0x453/0xaf0 [ 1247.410098] ? rtnetlink_put_metrics+0x520/0x520 [ 1247.414890] ? perf_trace_lock+0xeb/0x4c0 [ 1247.419046] ? __copy_skb_header+0x2f0/0x510 [ 1247.423466] ? SOFTIRQ_verbose+0x10/0x10 [ 1247.427542] netlink_rcv_skb+0x160/0x410 [ 1247.431617] ? rtnetlink_put_metrics+0x520/0x520 [ 1247.436387] ? netlink_ack+0xa60/0xa60 [ 1247.440308] netlink_unicast+0x4d7/0x6a0 [ 1247.444388] ? netlink_attachskb+0x710/0x710 [ 1247.448818] netlink_sendmsg+0x80b/0xcd0 [ 1247.452921] ? netlink_unicast+0x6a0/0x6a0 [ 1247.457168] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1247.462388] ? netlink_unicast+0x6a0/0x6a0 [ 1247.466651] sock_sendmsg+0xcf/0x120 [ 1247.470390] ___sys_sendmsg+0x3e2/0x920 [ 1247.474398] ? copy_msghdr_from_user+0x410/0x410 [ 1247.479187] ? check_preemption_disabled+0x41/0x280 [ 1247.484223] ? perf_trace_lock+0xeb/0x4c0 [ 1247.488383] ? lock_downgrade+0x740/0x740 [ 1247.492547] ? SOFTIRQ_verbose+0x10/0x10 [ 1247.496629] ? find_held_lock+0x2d/0x110 [ 1247.500703] ? __might_fault+0x11f/0x1d0 [ 1247.504790] ? lock_downgrade+0x740/0x740 [ 1247.509126] __sys_sendmmsg+0x195/0x470 [ 1247.513127] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1247.517595] ? lock_downgrade+0x740/0x740 [ 1247.521898] ? __mutex_unlock_slowpath+0xea/0x670 [ 1247.526768] ? check_preemption_disabled+0x41/0x280 [ 1247.531895] ? wait_for_completion+0x3c0/0x3c0 [ 1247.536494] ? vfs_write+0x15b/0x550 [ 1247.540236] ? ksys_write+0x1c8/0x2a0 [ 1247.544052] ? __ia32_sys_read+0xb0/0xb0 [ 1247.548128] ? __ia32_sys_clock_settime+0x260/0x260 [ 1247.553192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1247.558003] __x64_sys_sendmmsg+0x99/0x100 [ 1247.562254] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1247.566866] do_syscall_64+0xf9/0x620 [ 1247.570688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.575893] RIP: 0033:0x45c799 [ 1247.579111] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1247.598020] RSP: 002b:00007fefbf355c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1247.605738] RAX: ffffffffffffffda RBX: 00007fefbf3566d4 RCX: 000000000045c799 [ 1247.613016] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1247.620311] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1247.627589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1247.634863] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000015 10:42:14 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x2f, "420fb942"}}]}) [ 1247.673148] device veth1169 left promiscuous mode 10:42:14 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x300, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:14 executing program 2 (fault-call:10 fault-nth:22): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) 10:42:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 1247.795178] hfs: unable to parse mount options [ 1247.807643] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:14 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0xfffffffffffff000) [ 1247.878126] hfs: unable to parse mount options 10:42:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xb200}, 0x0) 10:42:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x6f4) 10:42:14 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x370, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:14 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x30, "420fb942"}}]}) [ 1247.969596] FAULT_INJECTION: forcing a failure. [ 1247.969596] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.002669] CPU: 1 PID: 11169 Comm: syz-executor.2 Not tainted 4.19.109-syzkaller #0 [ 1248.010598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1248.019973] Call Trace: [ 1248.022608] dump_stack+0x188/0x20d [ 1248.026239] should_fail.cold+0xa/0x1b [ 1248.030126] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1248.035228] ? __lock_is_held+0xad/0x140 [ 1248.039293] __should_failslab+0x115/0x180 [ 1248.043525] should_failslab+0x5/0xf [ 1248.047234] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1248.051898] ? find_held_lock+0x2d/0x110 [ 1248.055954] ? fs_reclaim_acquire+0x10/0x10 [ 1248.060283] ? should_fail+0x142/0x7bc [ 1248.064170] tcf_block_get_ext+0x78b/0x1670 [ 1248.068495] ? tcf_net_init+0x340/0x340 [ 1248.072491] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1248.077513] ? kmem_cache_alloc_node_trace+0x34d/0x750 [ 1248.082921] ? __debug_object_init+0x17d/0xac0 [ 1248.087508] ? kasan_unpoison_shadow+0x30/0x40 [ 1248.092093] tcf_block_get+0xa9/0xf0 [ 1248.095808] ? tcf_block_get_ext+0x1670/0x1670 [ 1248.100387] ? blackhole_dequeue+0x10/0x10 [ 1248.104651] ? qdisc_class_hash_alloc+0x86/0xa0 [ 1248.109322] hfsc_init_qdisc+0x155/0x410 [ 1248.113393] ? hfsc_reset_qdisc+0xd30/0xd30 [ 1248.117733] qdisc_create+0x556/0x1170 [ 1248.121633] ? tc_get_qdisc+0xa90/0xa90 [ 1248.125604] ? nla_parse+0x1f3/0x2f0 [ 1248.129314] tc_modify_qdisc+0x4bd/0x1929 [ 1248.133467] ? qdisc_create+0x1170/0x1170 [ 1248.137611] ? mutex_trylock+0x1a0/0x1a0 [ 1248.141688] ? qdisc_create+0x1170/0x1170 [ 1248.145837] rtnetlink_rcv_msg+0x453/0xaf0 [ 1248.150071] ? rtnetlink_put_metrics+0x520/0x520 [ 1248.154824] ? perf_trace_lock+0xeb/0x4c0 [ 1248.158968] ? __copy_skb_header+0x2f0/0x510 [ 1248.163384] ? SOFTIRQ_verbose+0x10/0x10 [ 1248.167464] netlink_rcv_skb+0x160/0x410 [ 1248.171541] ? rtnetlink_put_metrics+0x520/0x520 [ 1248.176307] ? netlink_ack+0xa60/0xa60 [ 1248.180209] netlink_unicast+0x4d7/0x6a0 [ 1248.184272] ? netlink_attachskb+0x710/0x710 [ 1248.188695] netlink_sendmsg+0x80b/0xcd0 [ 1248.192773] ? netlink_unicast+0x6a0/0x6a0 [ 1248.196999] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1248.202194] ? netlink_unicast+0x6a0/0x6a0 [ 1248.206454] sock_sendmsg+0xcf/0x120 [ 1248.210165] ___sys_sendmsg+0x3e2/0x920 [ 1248.214139] ? copy_msghdr_from_user+0x410/0x410 [ 1248.218915] ? check_preemption_disabled+0x41/0x280 [ 1248.223936] ? perf_trace_lock+0xeb/0x4c0 [ 1248.228078] ? lock_downgrade+0x740/0x740 [ 1248.232237] ? SOFTIRQ_verbose+0x10/0x10 [ 1248.236299] ? find_held_lock+0x2d/0x110 [ 1248.240360] ? __might_fault+0x11f/0x1d0 [ 1248.244423] ? lock_downgrade+0x740/0x740 [ 1248.248585] __sys_sendmmsg+0x195/0x470 [ 1248.252569] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1248.256885] ? lock_downgrade+0x740/0x740 [ 1248.261048] ? __mutex_unlock_slowpath+0xea/0x670 [ 1248.265988] ? check_preemption_disabled+0x41/0x280 [ 1248.271002] ? wait_for_completion+0x3c0/0x3c0 [ 1248.275584] ? vfs_write+0x15b/0x550 [ 1248.279297] ? ksys_write+0x1c8/0x2a0 [ 1248.283107] ? __ia32_sys_read+0xb0/0xb0 [ 1248.287161] ? __ia32_sys_clock_settime+0x260/0x260 [ 1248.292185] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1248.296940] __x64_sys_sendmmsg+0x99/0x100 [ 1248.301170] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1248.305745] do_syscall_64+0xf9/0x620 [ 1248.309541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.314722] RIP: 0033:0x45c799 [ 1248.317913] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1248.336819] RSP: 002b:00007fefbf355c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1248.344708] RAX: ffffffffffffffda RBX: 00007fefbf3566d4 RCX: 000000000045c799 [ 1248.351970] RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 [ 1248.359338] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 1248.366608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1248.373875] R13: 00000000000008d3 R14: 00000000004cb6b3 R15: 0000000000000016 [ 1248.410360] x_tables: duplicate underflow at hook 2 10:42:15 executing program 2 (fault-call:10 fault-nth:23): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1248.422891] hfs: unable to parse mount options [ 1248.429868] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1248.458604] hfs: unable to parse mount options 10:42:15 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x31, "420fb942"}}]}) [ 1248.556228] device veth1171 entered promiscuous mode [ 1248.606358] device veth1171 left promiscuous mode 10:42:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x48a000, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x40800) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, 0x0, 0x0) listen(r2, 0x0) r3 = getpid() fstat(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000000)='./file1\x00', 0x501c00, 0x40) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="020000000a00020000040001fffffff606000500020000"], 0x3}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e00)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)}], 0x2, 0x0, 0x0, 0x4048100}, {0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="199c342de2cfb2475fa43049d2c7402e95bd204d1fa23775e6cd1e06d7d0880bd8f3e65715a176a0359b008f60fff0d9866ffb777d95afbc9462fcafdc0726dfc8c5d7387b1b64263100911c1abd340ec31373437f1d8a09", 0x58}], 0x1, &(0x7f0000000500)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4}}}], 0x40, 0x4004}, {&(0x7f0000000580)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000740)}, {&(0x7f00000007c0)="396f9b8f20161051958bcfc059abda636d7dc628cd78cae1b0bf6b342a735ebe272908a097a659e8aa2b76526f8724c4ab124dc90b42a2e939e1099f7dbd048d464453e77cccffb17ee5582c4b04185eb2991bb800cddd59deec6589b4ea6bf7c0568c77310769b27a9d68832f3a42259994b11d0354", 0x76}], 0x3, &(0x7f00000010c0)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRESHEX=r5, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x3a}, {&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x4, 0xc811) ptrace$pokeuser(0x6, r3, 0x7fffffff, 0x4382) [ 1248.638496] hfs: unable to parse mount options 10:42:15 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x468, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000180)=0x5d1, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x3e8, 0x1f8, 0x1f8, 0x1f8, 0x100, 0x1f8, 0x318, 0x318, 0x318, 0x318, 0x318, 0x4, &(0x7f0000000000), {[{{@ipv6={@ipv4={[], [], @broadcast}, @local, [0xff000000, 0x0, 0xff, 0xff000000], [0xff000000, 0xfffffe01, 0xffffff00, 0xff], 'ip6tnl0\x00', 'ipvlan0\x00', {}, {0xf9d3c384f7e37e66}, 0x21, 0x75, 0x1, 0x8}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@inet=@ipcomp={{0x30, 'ipcomp\x00'}, {[0x4d6, 0x4d3], 0x1}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [0x0, 0xff], [0xff, 0xff, 0xffff00, 0xff000000], 'ip6erspan0\x00', 'batadv0\x00', {0xff}, {0xff}, 0x2e, 0x2, 0x4, 0xc}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x44, 0x20}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@loopback, @local, [0x0, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xff, 0x0, 0xff], 'xfrm0\x00', 'netdevsim0\x00', {0xff}, {0xff}, 0x87, 0x1, 0x3, 0x20}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"1e94"}}, @common=@hl={{0x28, 'hl\x00'}, {0x0, 0x87}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x448) [ 1248.735970] hfs: unable to parse mount options 10:42:15 executing program 3: perf_event_open(&(0x7f000025c000)={0x3, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000240)={0x0, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000180)={0x8, 0x2, 0x7}) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}}, 0x20}}, 0x0) 10:42:15 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1248.759906] x_tables: duplicate underflow at hook 2 10:42:15 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x32, "420fb942"}}]}) [ 1248.794819] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1248.888163] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1248.918573] hfs: unable to parse mount options [ 1248.955094] x_tables: duplicate underflow at hook 2 [ 1248.984421] hfs: unable to parse mount options 10:42:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xbb0e}, 0x0) 10:42:15 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x500, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:15 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x33, "420fb942"}}]}) 10:42:15 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x2) 10:42:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000100)={{0x1, 0x0, @descriptor="f762976cf365972c"}}) sendto$l2tp6(r1, &(0x7f0000000000)="85e9bc13ce30802b2d239ee10b65e2f6c39045824600b73fffcfa7fcfdc9be6f01bd2bf4c62888212f4c2141e0296fbfa19c585d5780f60dff8ee314097b3ddde7ad9d43e1669706ffd876945e7ccde6710330c499b75c46c0fa81358daf453ca7a6d5721aa02c3a16633d3e2bb153f613c72cbe46399b691b90918ddf1da18b611189191a8fc451b15d0632ada1d0ded295cae743cc7d85e0e39880476de2bc5321c72e68057744fd0e91b328729c25a735a90fa0207620f98f828817ef03", 0xbf, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x5, @local, 0x100, 0x2}, 0x20) socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000580300000000000000000000a800000000000000e80000008802000088020000880200008802000088020000040000000000000000000000fe8000000017000000000000000000aafe880000000000000000000000000101ffffff0000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f31000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000870000000000000000000000a800d00000000000000000000000000000000000000000000052454a4543540000000000000000000000000000000000000000000000000100000000000000fe88000000000000000000000000000100000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000763d88c0fab1ace18e7ea6bb22"], 0x11) [ 1249.082247] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1249.168568] device veth1171 entered promiscuous mode [ 1249.193866] hfs: unable to parse mount options [ 1249.208321] device veth1171 left promiscuous mode 10:42:16 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, r3, 0x20280, 0x2502}}, 0x20}}, 0x0) [ 1249.251365] hfs: unable to parse mount options 10:42:16 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x600, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) 10:42:16 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x34, "420fb942"}}]}) [ 1249.332361] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x3) [ 1249.452728] hfs: unable to parse mount options 10:42:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000980)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0xd, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x4c041) 10:42:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 10:42:16 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x700, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x8) 10:42:16 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000000740)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)=0x1}, {&(0x7f0000000200)=0x2, 0x2}, {&(0x7f0000000240)=0x1, 0x2}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=0x2}, {&(0x7f0000000300)=0x1}, {&(0x7f0000000340), 0x1}, {&(0x7f0000000380), 0x1}, {&(0x7f00000003c0)=0x2}, {&(0x7f0000000400)=0x1}, {&(0x7f0000000440)=0x2}, {&(0x7f0000000480)=0x2}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=0x2}, {&(0x7f0000000540)=0x2, 0x1}, {&(0x7f0000000580)=0x1, 0x2}, {&(0x7f00000005c0)=0x2}, {&(0x7f0000000600)=0x2, 0x2}, {&(0x7f0000000640), 0x2}, {&(0x7f0000000680)=0x2, 0x1}, {&(0x7f00000006c0)=0x1, 0x2}, {&(0x7f0000000700)=0x2, 0x1}], 0xd, 0x17, &(0x7f00000008c0)={0x77359400}, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000900)='net/dev_snmp6\x00') ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000980)={0x1, 0x0, &(0x7f0000000940)=[0x0]}) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000009c0)=r4) r5 = dup(r2) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010800000000000000", @ANYRES32=r6, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) [ 1249.566882] hfs: unable to parse mount options [ 1249.582707] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:16 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x35, "420fb942"}}]}) 10:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x4) [ 1249.670170] device veth1173 entered promiscuous mode 10:42:16 executing program 4: times(&(0x7f0000000140)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYRESHEX=r1], 0x1) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 1249.703356] device veth1173 left promiscuous mode [ 1249.703893] hfs: unable to parse mount options [ 1249.767671] hfs: unable to parse mount options 10:42:16 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0xa00, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:16 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x36, "420fb942"}}]}) 10:42:16 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x20) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r4, 0x800, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x3a15024f33f75241) r5 = dup(r3) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x3}}, 0x20}}, 0x0) [ 1249.855130] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x5) [ 1249.933407] hfs: unable to parse mount options 10:42:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x0) [ 1249.998244] hfs: unable to parse mount options 10:42:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCRSGL2CALL(0xffffffffffffffff, 0x89e5, &(0x7f00000004c0)=@rose) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x6, 'xfrm0\x00', {0x144}, 0x8}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x8240, 0x109) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000480)=0x2, 0x4) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x3b8) [ 1250.033880] 8021q: adding VLAN 0 to HW filter on device team0 10:42:16 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x37, "420fb942"}}]}) [ 1250.104888] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:16 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x2000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1250.147128] hfs: unable to parse mount options 10:42:16 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x6) [ 1250.172587] device veth1175 entered promiscuous mode [ 1250.180258] device veth1175 left promiscuous mode [ 1250.208465] hfs: unable to parse mount options 10:42:17 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) accept4$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed}, &(0x7f0000000180)=0xe, 0x800) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x3}}, 0x20}}, 0x0) 10:42:17 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000040)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x37}}}}, &(0x7f0000000100)=0x84) flock(r1, 0x1) 10:42:17 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x38, "420fb942"}}]}) [ 1250.322443] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:17 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x3f00, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1250.409313] hfs: unable to parse mount options [ 1250.461364] hfs: unable to parse mount options 10:42:17 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x8) 10:42:17 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xe57, 0x200000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:17 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x39, "420fb942"}}]}) 10:42:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 10:42:17 executing program 3: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x3e2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000300)="4049c081e113f7bbe3747d1480a18e205983388a4f8d79c8bbb8f6fdf5") socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="b1cda6f69dbdf0339ab30120726732f17635fc314008115145776a87b4b4da99b1329af7b4840cff4b37c80bfa86ae4dab1cf497de816dca7b4c4cab7750387f127fea45cbd8010811850e5e4e2dde640b587f695644059e6660e47491ee2b75ac969bdedfd7b84513c3aca441a65bc9a30d4ae7a9cd6c0e9e592601a3f527a795ea8701fb6b632a4faa1bc8a9325ffcf92188b8698eebc19685c8f4ef0d2a6a6b223c0e334e6446729a9f9afda16c035bc7351f42581deb378223a9566330af4c1b204ebc52a1c6a2a6ae8fb98080fd77cbec8a8d1507e1680df1ae", 0xdc, 0xfffffffffffffffd) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)={0x2f, 0x4, 0x0, {0x1, 0x10001, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) keyctl$instantiate(0xc, r5, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r6, 0x0) ioctl$EVIOCGUNIQ(r6, 0x80404508, &(0x7f0000000500)=""/207) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="200000001000010800000000000061dc8bfa0ebd2c53bbdd00", @ANYRES32=r7, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) [ 1250.600887] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1250.623467] hfs: unable to parse mount options 10:42:17 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x1b8, 0x0, 0x1b8, 0x0, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00', {}, {0xff}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xec5d, 0x0, 0x0, 0xffffffff, 0x101, 0x2, 0x5, 0x5]}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000280)={r6, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r6}}, 0x20}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r12 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r12, 0x107, 0x1, &(0x7f0000000280)={r11, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r11}}, 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x98, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKINFO_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) [ 1250.675709] hfs: unable to parse mount options 10:42:17 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x4001, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:17 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3a, "420fb942"}}]}) [ 1250.734615] device veth1177 entered promiscuous mode [ 1250.768837] device veth1177 left promiscuous mode [ 1250.809308] hfs: unable to parse mount options [ 1250.871124] hfs: unable to parse mount options 10:42:17 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget$private(0x0, 0x4000, 0x400, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x0) 10:42:17 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3b, "420fb942"}}]}) [ 1250.960535] device veth1769 entered promiscuous mode 10:42:17 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x9) 10:42:17 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x4800, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1250.988556] device veth1769 left promiscuous mode [ 1250.998953] hfs: unable to parse mount options [ 1251.059481] hfs: unable to parse mount options 10:42:17 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3c, "420fb942"}}]}) [ 1251.107598] device sit0 left promiscuous mode [ 1251.122687] device veth1769 entered promiscuous mode 10:42:17 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000a9c79e731bb96a95f9ace63a54c262af52309812759534262dadb27e61321d903242e9e36e29089048ccc7bf7ec82c2d1188d9d6689cda4795ab777dfddd1d18006908f1ae57210ead520f4d3bd5d48f6299a1ca25017992b2fca3fedde9878e4699497ead422dbf65d9b50a1558c24da0a4a758db4ab2ec292be0897bf2e5e6c944acfdad67e6c31379bda41370fa1a35b7e0d36854086cdb6937ca24aaa183dd8f587dcd1b56a8ded8e382d6405ff471279d033643bd46964138be696346e5e45d54ebe4545f03be13d5efa12f2feb136eb672d8bb5d413d18402e122530a75e10de74b1"], 0x20}}, 0x0) [ 1251.196730] device veth1177 entered promiscuous mode [ 1251.245858] hfs: unable to parse mount options [ 1251.307636] hfs: unable to parse mount options 10:42:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 10:42:18 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x4c00, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:18 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "220fb942"}}]}) [ 1251.373944] device veth1769 left promiscuous mode [ 1251.479209] hfs: can't find a HFS filesystem on dev loop0 [ 1251.521386] device veth1177 entered promiscuous mode [ 1251.559350] hfs: can't find a HFS filesystem on dev loop0 [ 1251.622073] device veth1177 left promiscuous mode 10:42:18 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000"/17, @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) 10:42:18 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xa) 10:42:18 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "250fb942"}}]}) 10:42:18 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x6000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 10:42:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0xf, 0x9, 0x200, &(0x7f00000000c0)="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"}) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4323834165f22c5edab0d78f5aa30e80604a8e302e4872bd4cafd9e06e9499dbf4936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000280)={r6, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="20000000f016d90f00000500000002000000007a", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x40) recvfrom(r2, &(0x7f00000004c0)=""/178, 0xb2, 0x20100, &(0x7f0000000980)=@can={0x1d, r6}, 0x80) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000100)={0x1, 0x3, 0x1000, 0x0, 0xfffffffffffffffd, 0xd6, 0x0, &(0x7f0000000000)="a70b11ce2aab848d66563cdabeef170f7a223cdd2ec6d5800ff938487ad077b147a5604c9f88319833858942ea4fac7a41fb54e33a3dd7d4d2345afa91eea00ad2b6a405bd5080173ce64f9ffd2427ed558d20b8807799eba75d21cf5ad1f5138db44edb6c971c8ef9b3dde10ab0ca49ee79b5e3381ebc90dc0e3cf6df56d6bc62228d13795814b5e3bb667be4dbc1ae1c85cb56d50a191049c781e6f95f42f55201564b3bc2631f483213dde729b1e791f5f52a393117abd6b5c89da4362fee432273bc12c99cd5c6cdbc333a9d5b3a7be539698158"}) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff02000000000000000000000000005938010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000010000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) [ 1251.799157] hfs: can't find a HFS filesystem on dev loop0 10:42:18 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "2c0fb942"}}]}) [ 1251.885521] hfs: can't find a HFS filesystem on dev loop0 [ 1251.992002] hfs: unable to parse mount options 10:42:18 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vsock\x00', 0x18000, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, r1, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x48a000, 0x0) sendmmsg$unix(r6, 0x0, 0x0, 0x40800) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, 0x0, 0x0) listen(r7, 0x0) r8 = getpid() fstat(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="020000000a00020000040001fffffff606000500020000"], 0x3}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e00)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)}], 0x2, 0x0, 0x0, 0x4048100}, {0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="199c342de2cfb2475fa43049d2c7402e95bd204d1fa23775e6cd1e06d7d0880bd8f3e65715a176a0359b008f60fff0d9866ffb777d95afbc9462fcafdc0726dfc8c5d7387b1b64263100911c1abd340ec31373437f1d8a09", 0x58}], 0x1, &(0x7f0000000500)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9}}}], 0x40, 0x4004}, {&(0x7f0000000580)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000740)}, {&(0x7f00000007c0)="396f9b8f20161051958bcfc059abda636d7dc628cd78cae1b0bf6b342a735ebe272908a097a659e8aa2b76526f8724c4ab124dc90b42a2e939e1099f7dbd048d464453e77cccffb17ee5582c4b04185eb2991bb800cddd59deec6589b4ea6bf7c0568c77310769b27a9d68832f3a42259994b11d0354", 0x76}], 0x3, &(0x7f00000010c0)=ANY=[@ANYRES32=r7, @ANYRES32=r6, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRESHEX=r10, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x3a}, {&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x4, 0xc811) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000280)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) r13 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x48a000, 0x0) sendmmsg$unix(r13, 0x0, 0x0, 0x40800) r14 = socket$unix(0x1, 0x1, 0x0) bind$unix(r14, 0x0, 0x0) listen(r14, 0x0) r15 = getpid() fstat(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r17 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="020000000a00020000040001fffffff606000500020000"], 0x3}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e00)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)}], 0x2, 0x0, 0x0, 0x4048100}, {0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="199c342de2cfb2475fa43049d2c7402e95bd204d1fa23775e6cd1e06d7d0880bd8f3e65715a176a0359b008f60fff0d9866ffb777d95afbc9462fcafdc0726dfc8c5d7387b1b64263100911c1abd340ec31373437f1d8a09", 0x58}], 0x1, &(0x7f0000000500)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r15, r16}}}], 0x40, 0x4004}, {&(0x7f0000000580)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000740)}, {&(0x7f00000007c0)="396f9b8f20161051958bcfc059abda636d7dc628cd78cae1b0bf6b342a735ebe272908a097a659e8aa2b76526f8724c4ab124dc90b42a2e939e1099f7dbd048d464453e77cccffb17ee5582c4b04185eb2991bb800cddd59deec6589b4ea6bf7c0568c77310769b27a9d68832f3a42259994b11d0354", 0x76}], 0x3, &(0x7f0000000900)=ANY=[@ANYRES32=r14, @ANYRES32=r13, @ANYBLOB="1c000900000000ef8bcb0415728455117cdce72ffd7fd7b031f483df64f6ccc595c291ede5f2143df88e01624d075c016ff1d600ea3afd9776d0a585ae44fee3eea4ac10b7910c108b20d8f2918db2b527138566dd2e06088968c9894123d59a9a56324c093164db269dc6301eb106206d9e87b86204d494c7581b19f6de98fd3d5d25688ab6c5bb5e0b8e3581ca6f", @ANYRES32, @ANYRESHEX=r17, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x3a}, {&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x4, 0xc811) r18 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r18, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) setuid(r19) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0\x00', r19, r20) getgroups(0x5, &(0x7f00000003c0)=[0x0, 0xffffffffffffffff, r20, 0x0, 0x0]) newfstatat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) r23 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r23, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r23, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r23, 0x0, 0x489, &(0x7f00000001c0)={{0x32, @empty, 0x0, 0x0, 'none\x00'}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7b2d3f17}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(r23, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$binfmt_elf64(r23, &(0x7f0000000400)=ANY=[], 0xffffffa8) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x400, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)=0x0) r27 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r27, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) setuid(r28) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0\x00', r28, r29) fsetxattr$system_posix_acl(r4, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000780)={{}, {0x1, 0x2}, [{0x2, 0x1, r9}, {0x2, 0x1, r11}, {0x2, 0xe, r12}, {0x2, 0x3, r16}], {0x4, 0x6}, [{0x8, 0x7, r21}, {0x8, 0x2, r22}, {0x8, 0x2, r24}, {0x8, 0x2, r25}, {0x8, 0x4, r26}, {0x8, 0x6, r29}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2) getdents(r5, &(0x7f0000000180)=""/42, 0x2a) r30 = dup(r4) getsockname$packet(r30, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r31, 0x3}}, 0x20}}, 0x0) [ 1252.047698] hfs: unable to parse mount options 10:42:18 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4202b942"}}]}) [ 1252.101788] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 [ 1252.117416] device veth1177 entered promiscuous mode [ 1252.127172] device veth1771 entered promiscuous mode [ 1252.146848] device veth1177 left promiscuous mode 10:42:18 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x6800, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:18 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xb) [ 1252.185479] device veth1771 left promiscuous mode [ 1252.207798] hfs: can't find a HFS filesystem on dev loop0 [ 1252.256785] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 [ 1252.268567] hfs: can't find a HFS filesystem on dev loop0 10:42:19 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4203b942"}}]}) [ 1252.329333] device veth1771 entered promiscuous mode 10:42:19 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000180)={0x44, 0xff}, 0x2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x3}}, 0x20}}, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000000)=0xd1) [ 1252.401811] device veth1177 entered promiscuous mode 10:42:19 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x6804, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:19 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xc) [ 1252.430693] hfs: can't find a HFS filesystem on dev loop0 [ 1252.443563] device veth1771 left promiscuous mode 10:42:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 1252.492312] hfs: can't find a HFS filesystem on dev loop0 10:42:19 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4204b942"}}]}) 10:42:19 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)={0x43c, 0x3f4, 0x400, 0x70bd2b, 0x25dfdbfe, {0x6, 0x2, 0x15, [0x9, 0x9, 0x0, 0x6, 0x720000, 0x0, 0x7be, 0x1, 0x4, 0x8, 0x8, 0x80000001, 0xd3b, 0xffff, 0x4, 0x6, 0x40, 0x5, 0x7fffffff, 0x1, 0xfffffffa, 0x0, 0x1000, 0x100, 0xfffffe00, 0x6, 0x8001, 0x0, 0x3, 0x1, 0x5, 0x80, 0xf401, 0x2, 0xfffffffc, 0x8, 0x5, 0x8, 0xf7fc, 0x58b, 0x7, 0x9, 0x8, 0x8, 0x3, 0x200, 0x6, 0x4, 0x865, 0x3, 0x0, 0x2, 0x3, 0x2e4, 0x401, 0xfffffffd, 0x1f, 0x2, 0x7fff, 0x401, 0xfffff9b4, 0x75, 0x9, 0x608], [0x2, 0x3, 0x0, 0xffff, 0x5, 0x0, 0x4, 0x28b, 0x200, 0x3, 0xffff, 0xc, 0x3, 0x7ff, 0x1, 0x2, 0x130, 0x3, 0xac6c, 0xfffffffc, 0x4, 0x4, 0xfff, 0x4, 0xea37, 0x1, 0x1, 0x1, 0x2, 0x8, 0x7ff, 0x6, 0x80, 0x81, 0x4, 0x8, 0x10001, 0xfffffff7, 0x7fffffff, 0x3, 0x800, 0x0, 0x9, 0x3, 0x0, 0x20, 0xa9, 0x40, 0x6, 0x9, 0x1, 0x91a, 0x3, 0x7, 0x9, 0x1000, 0x5, 0x7, 0xfffffff7, 0x3, 0x763, 0x5, 0x0, 0x4], [0x7, 0x20, 0x2, 0xaa, 0x8, 0x7fffffff, 0xff, 0x7, 0x316f, 0x100, 0x40, 0x9, 0x0, 0x2, 0x4, 0x0, 0xae2, 0x9, 0xc6, 0x3, 0x3, 0xf2, 0x1, 0x401, 0x1, 0x9, 0x0, 0x8, 0x0, 0x3, 0x6, 0x1, 0x0, 0x4fe, 0x7fffffff, 0x7f, 0x7, 0x200, 0x3d, 0x8, 0x0, 0x9, 0x5, 0xff, 0x4, 0xfff, 0xfffffff7, 0x7, 0x1b78, 0xee0, 0x4, 0xffffffff, 0x10001, 0x6, 0x0, 0x100, 0x9, 0xfffff12d, 0x3ff, 0x6, 0x6, 0x6, 0x5, 0x20], [0x100, 0xffffffff, 0x40, 0x101, 0x3, 0x3, 0xd6, 0xb85, 0x0, 0x6, 0xfffffff9, 0xfd9, 0xfffffff8, 0x0, 0x2, 0x3, 0x81, 0x5826173b, 0x0, 0x6, 0x2, 0xffff, 0x7d, 0x3, 0x4, 0x3, 0x6e, 0xffffffff, 0x0, 0x101, 0x1, 0x80000000, 0x341, 0x5, 0xfe03, 0x0, 0x5, 0x8000, 0x8, 0x3f, 0x2, 0x5, 0x8000, 0x6, 0x0, 0x1, 0x20, 0x426, 0x23a2, 0xdd, 0x3, 0x318e, 0x5, 0x4, 0x4, 0x7, 0xf3, 0x5, 0x3, 0x8, 0x0, 0xffffffd3, 0x7ff, 0x5], 0x1c, ['\xccmime_typesecurity^\x00', 'none\x00', 'nv\x00']}, ["", "", "", ""]}, 0x43c}}, 0x2004c040) r2 = accept4$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000200)=0x1c, 0x800) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000240)=0x5, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000a40)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000041a34a23b756560796f35eb6e1000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f73653000001c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000a800d0000000000000000000000000000000000000000000000000002800434c415353494659000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000083bd00000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280000000000000000000000000000000000000000000000000000dd9b96e4abe037eee72419018f286bf075f2361342f617aa90d1f0cda1882f7e48439b85d689900cb41e6ed7ad7fc5c4434cf74e9a2f447a19c7db8b4dccbb552e2f99ebcf4973688a16cfd9005880b6a0b40b9c42174ac202bd603cd778586e4f3a5895ed6187e37cc0e32fa6a0c7f2325df5d94a6dad91d6ba17f1fbc6cb4464f7485dc912f62e22f10fa364af1c303ea256c11969452e0fe632c6d219d61891992f73d88e"], 0x3b8) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f00000001c0)={{0x32, @empty, 0x0, 0x0, 'none\x00'}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7b2d3f17}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'veth0_to_bond\x00', @ifru_addrs=@isdn={0x22, 0x5, 0x20, 0x0, 0x5}}}) 10:42:19 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000000)={0x2, 0x10001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r7, &(0x7f0000000340)=[{&(0x7f00000004c0)='f', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r7, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r6, &(0x7f00000066c0)={0x0, 0x0, &(0x7f0000006680)={&(0x7f0000000000)={0x14}, 0x14}}, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x39, &(0x7f0000004e80)=ANY=[@ANYBLOB="0002040000000000ff020000000000000000000000000001883bd2c4241abfced696d1aee1a0bfbef204bdb04a1665e75167b7a697f7d77f23c2686d2a1309000000bfaf0b598147c512bbc151e64f488471b045db3bd14c922a7a4759175381717fdf33cb3e05000000d93b9462e1e2e4f2b75e4b15043094ff7d4080f9fe82553f06d200000000a8090000000000000063fbd77acaa12d1fd474a6ce27139316e3d3168d8d728c525a11446f99429ba6b9d374e443b155e6c430c4947b89a8ceceb7d09beea6d7d9e138476782e703b2468971fe86c31bd9225a94d67ec4ce66af741b02473db6f8b2855d7b5505853110b9c2c40c9bce94ca03392a444a17d62f5851329ef1ca93750a818bce90e13d220000000000000008d8b805c33b4b95726bb009000000b8bdd61217f23223dd9482c930722b660f95c6701f000000000000000368b4145b5c8d4daa75b1e4cc872605001c1d207a262ff50bc325092fda4ec96d1789c30d6da56b9c13f530162927f8c45aefe1913cc09b45abbb81d9aadd803b7c586216e774fad71631b7515e15e1026d18be610eb70ed88e09ad4b2b4ad70ec17f17ab7828a4e8f54c22fa7c3732329a57bd9ff7c91b6a9a82bae58e2339f30700000000000000c1ad82749833b4a45963e75b4e0f90923460f9ceab69e7f2292e1ec5ee40ecb054ec58eb9223bb40abbb92266579ba54aac10c78ce69cb796555208ac0829160258023ee1871dc7cbde641463a0b9bbc9447ffc57a1898bdcd5486a6acf399764cb46a7f3a9e4a5eb0c14140c786bdc2045601397c12c99a8b68857ef73ac5118b584e74c2c76710b20512a7115b8f780c25d3bce7eb7e1102000000000000007b57ae7ddb59da38e7ca59dddfd8d5b5b36ad00af7b02b06a6f3457b732890c0d15d4d8a9ad64b195548ff02cacc4181edc58f5a380fbe0c9cfca31a70f02efce9749b37b26d79a351250837f8ceedab2f7f647de15a2ceb712c1267060c57c76554029beaf172da3816da5a410f7efca5914a8980e0c2390155c3dc982fc9ec545e7ef778847d9a0d8c505247a49c57968e6bd5f9712696203e8ba54b5f1bc1973210a481563557d4bb9a726c69c7f2b7169be8311500000000000000000000045a60413335f962bdb8afc639281ea365009e0d701fa1d836392e59170143ed53b362e656abf33350aebf6cfdf1e24439812eb81b67295ff0454aaa9ca024dbb8309a20d8d90fd1426dcf87fe1b6cc3cafb69b594941742e3a8b3b530341e46bb8bf57c7e93aa082b1b4393932e714ee17c28c673007cd8ca88d0f49bc15743c383392f634c456917220912355ef61ef65b4337f0149e917bf9711d330f4b438c2d37a857d365af17b6b86c2c25b97ef50f8f57d100b0ca265bf5b3387239cd26aa1a4a00614e21f4f59669dbc63e5bcce950e95928e2640b6f0e0000"], 0x18) getsockopt$inet6_opts(r4, 0x29, 0x36, 0x0, &(0x7f0000000080)) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x3}}, 0x20}}, 0x0) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r9, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) fsetxattr$trusted_overlay_opaque(r9, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) [ 1252.639400] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 [ 1252.676492] hfs: can't find a HFS filesystem on dev loop0 10:42:19 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x6c00, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1252.722733] hfs: can't find a HFS filesystem on dev loop0 [ 1252.728290] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 [ 1252.740973] device veth1177 entered promiscuous mode 10:42:19 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xe) [ 1252.768502] device veth1177 left promiscuous mode 10:42:19 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4205b942"}}]}) 10:42:19 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x10000, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000400)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x48a000, 0x0) sendmmsg$unix(r2, 0x0, 0x0, 0x40800) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, 0x0, 0x0) listen(r3, 0x0) r4 = getpid() fstat(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="020000000a00020000040001fffffff606000500020000"], 0x3}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e00)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)}], 0x2, 0x0, 0x0, 0x4048100}, {0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="199c342de2cfb2475fa43049d2c7402e95bd204d1fa23775e6cd1e06d7d0880bd8f3e65715a176a0359b008f60fff0d9866ffb777d95afbc9462fcafdc0726dfc8c5d7387b1b64263100911c1abd340ec31373437f1d8a09", 0x58}], 0x1, &(0x7f0000000a40)=ANY=[@ANYBLOB="ffff1c8434c3bb2ae86040dce8413b0004697191db212ca2d80ca964293a11d075171a7f2dd63f456c6c7940fee4f5fb392aebafa01fe875fbf62b4915586050f7b167e6bfee9471594d78afdd2a5f06435a2b884597e053836dc99c847624a081898cf85a253cf538e231d1d776f83a9b7eeee296b80c20453b7816e2054570e464af039dc0c032affe68ef9a80c93dea24c1abac705fc4beedb453b37f98433f6ac376b075f36c3d037e93ccbc19c1de57698c65e608d777a569a03898140781c88654ac551b400b634ba6bd9a84dade", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x40, 0x4004}, {&(0x7f0000000580)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000740)}, {&(0x7f00000007c0)="396f9b8f20161051958bcfc059abda636d7dc628cd78cae1b0bf6b342a735ebe272908a097a659e8aa2b76526f8724c4ab124dc90b42a2e939e1099f7dbd048d464453e77cccffb17ee5582c4b04185eb2991bb800cddd59deec6589b4ea6bf7c0568c77310769b27a9d68832f3a42259994b11d0354", 0x76}], 0x3, &(0x7f00000010c0)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRESHEX=r6, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x3a}, {&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x4, 0xc811) r7 = request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffc) keyctl$get_persistent(0x16, r5, r7) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000160000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) [ 1252.876149] hfs: can't find a HFS filesystem on dev loop0 10:42:19 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x40, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x1406, 0x4, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x44044) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}}, 0x20}}, 0x0) 10:42:19 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x7003, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1252.962523] hfs: can't find a HFS filesystem on dev loop0 10:42:19 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4206b942"}}]}) [ 1253.010273] nla_parse: 11 callbacks suppressed [ 1253.010282] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1253.086944] hfs: can't find a HFS filesystem on dev loop0 [ 1253.113940] device veth1177 entered promiscuous mode [ 1253.120011] device veth1177 left promiscuous mode [ 1253.140045] hfs: can't find a HFS filesystem on dev loop0 10:42:19 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x7400, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 10:42:20 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4207b942"}}]}) 10:42:20 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = getpgrp(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000040)={r3, r4, 0x4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket(0x2c, 0x3, 0x7) ioctl$sock_inet_SIOCDARP(r6, 0x8953, &(0x7f0000000080)={{0x2, 0x4e20, @remote}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x46, {0x2, 0x4e22, @broadcast}, 'wg1\x00'}) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xf) [ 1253.304889] hfs: can't find a HFS filesystem on dev loop0 10:42:20 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x2, 0x10, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xdc}, 0x0, 0x0, 0x0, 0x9, 0x1, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000001c0)={0xa10000, 0x481, 0x9, r1, 0x0, &(0x7f0000000180)={0x9b0940, 0x9, [], @string}}) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r2 = open(&(0x7f00000006c0)='./bus\x00', 0x141042, 0x1d9) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x200000c, 0x50, r2, 0x6000) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3fb, 0x10, 0x70bd28, 0x25dfdbfd, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x24000100}, 0x0) rt_sigreturn() r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/dsp\x00', 0x400, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r3, 0x80045017, &(0x7f0000001100)) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) flock(r4, 0xf) r5 = socket$netlink(0x10, 0x3, 0x13) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r9 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x1a5000, 0x0) ioctl$SNDCTL_DSP_POST(r9, 0x5008, 0x0) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000001080)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001040)={&(0x7f0000001140)=ANY=[@ANYBLOB="6c090000b645a6e19b68b897f12d1dd74c5b4a187a262459e2b6573943bc86e40f8c57966b1bb36588b3f8e9624978b43e6f41089881b2b88905c9bea3fd25d551b4435d29e24dd1d7ca410490bed2743a4493b8e8d50b48a6c9dba4274a", @ANYRES16=r10, @ANYBLOB="010028bd7000fcdbdf25100000000500d50000000000080001000400000025059100d356f79e5b328bc53ddc18bc638295549fbe0e011f3abe9f4cfff1ca299d6f8585eb26c7a23d098c4f8181210d7070317bac25e2fb4ce660180de6f4bfab6bd0657d0ef61b448f543c513b2a12604eb6904e7d7f4887e6a43e3d5f0707181acb892011fbb51a0037eeceb8bef5d71139a4872530f532bc259705164718bc98e7e5667b90bada2d2d1a775279b927d6cba33545250cc446406ef7910bcc3ddd59203d288639dffc0a4e19bbefea8015dfd7d2f9e1ebdecc93a610789f4113781cd1fe890cb5580a9c363f364e4f1671b2f84811577fc22248e3c5b61d9db95bb3830857d93bbaae6cfaf2b8821ba4993aefc62423588ed72530e9fe5ac34cf9ae6d8c67d89226f4a85ec9e450af4c5f1416db5ac2c6076da1d2422c331f0d76d76bc3d5851587777483276c18de02f45e2914b2df27bef1e86de153cfbb9478d3c38bf7e64aa45e00f68670a461ca607694fea80f7898521c3620bc1ef3bbbf8d9d14e71e417bc7383e34c7517998906056371f82074f988f27a9be6130ac5cfa239606cd28f60688e801fef44fe9c90dcceaa7d6f891ac93f76d9d8396d8abf6fd3c2f0dae65ad908677fe87b84e8fd26d678238df07809c035dd9d7939657b73f687d06636124c760d1f06d12461153f67e3f800f8c7a7706a73069e4fd34904c4c6623f28b8678d21d0fcefdfa8a2999d8d4ebc1a404ab64d3288a7f576e270e3378a0f2af682be111972abd1fdd03640b56cbef7e83191569cbfa741c352c960ae2a00898eb0cec62a95b9ada5b6c0c5d350618c055d6a48438353084efc3e55d2896a70ac0f914d2a956d97404f9593ad4313919f2e62e3852cea009bb33cc8c9c0342045d90f94fdc20a188105f4bac150758001a143730fff0efe81d154c7dfec2bf10dbe811a8cbcbd2a0ddd8a74979021a0f571f96cff6bea0bbba2f8bdbe0c31a87e6e8e53397b0e4e58e3b447abb77959409eccde57f06a0d31919f27e623852df3f6f6abb1cceafa4d0fc3f649973381f86bccd7718092aab2df7b9720ffa5a3dba94ee5921e990bbc8d7c5927172e739ccf56f6429dc0bdb53ab66c15f0ecbbdaf52c41fc3130b953645f90814647ebe430e3c5ab1d93d353caf02ee170b24f91ab9594bb71a10e6ce2e75a76161632be1cfd1a3804615f68ddf74633671c1c72c4fc95c0654dacabede8a0a8180247f30f0e3122c6da3d3227285c11267582ec250af1388011bff1dd20f274f620aafa530d22582fc2d175f7b2321312a8ed0749d3ba448def2e3464729fe5c2580b1f949c96477865f4a74a1649e2fc3a7790f4ea50673588900314f2d34eb585b6da41d09a1528a6ca4722c4f2c99fcf35dcd47209437f89f3034705012016a87eb6e6618291c4c7a0b9ff4924532c16a3fa86fbecc6b68f3f4b9fae16148078b06d0b1018cdcb8c13bb1c514f5a01fd795c9526d6eece12a9badc012e9f93f164b5ab2b09ef756aa634d76ae770e77c5a386a3e02cc8c31f4f88332e416e27979e71216189b49b1745761b7adbca53ece9a3b3ede1717e419f1f27b8494ef815c5729123f2e786ab48f1cd1103aa732f8caa11027b3dea8c81d7867ddb8d02e6db48d7b97b0dfd1e502cb3dcf1c757fbf6bc92937b811cd689836bd858274aebe4a6182174d97963e1a72ca55195043040aa0e1c73ba51fa6444cedb39d069dd995f3e86f8d513614434fedbca372d5db8fd9d6ce6c2f3127d03bed86433f2fc0e710577208527e1bd4581ed4fd5c07b63d37f0fe3f5efed58e4463d0c484cd0c15e3e3eb48a0b23ad2344d5c124638f71efb6e4993dc19d5077f640cf6d35b4e1819638ec758cb544b5a03f000000560091006dcd6ca6fb7a5f8cdb47ea47964c5f531bf936f26e4d4642a53d3bc8645233607a82734557e01d3baeec4db28cb9df131816bd7c59944b86e917571ab5c41837b0e605f31be28eebd626672931739be76cb300000800a5000000000008004a000bac0f00b6039100ddc58e3513c296136468f8ce0fc9e8111833707528c8b34321c0323626d2b98360318d2149e15e251cd7c990eea028979fe90f520ffaf0137f1743252b2d42dc03e9d0c3eee2f00a72f827e00a8fc2c271acada9c0ff780a27056e7f4a75557275ac9de38769553a62f948e56dcfefc5e0100445b20c140c55fc5179c01a80d1338ef8583723a965107cc622dacc61928229a22b70e515bce9b405b340e0a8388dbcd3ee8a1ae7b29b6ef2d20d0954863fbb1e20876129e6274728a4ee45c7cf350334ec573a348108a631314e0c2547560b4c8204f8e71806555d6fe3576d651076c9d6a83daf5668583d62e59d2cccb8167b14347774cba9fc5e1be3bd7e506d23f62ad70dad635908f87d26923f142691b26fa6910336328c20411d07dfad84a957625daf73fc35efd135e19902462e7233095e336edffca254a51df18704e077a38a5f0c18404033f334ed82283998957c4b440bb9798eddd17f07557aa6698ace21833a625ab154aac0144fa5961c83c8119ed964b97e30d581b6d7ad88251e97fc1ac66e594053d81bb1ed7739cfd1fbde1a2a362669cf542b56ccc96f0488a1c3b097c6d2016aa25588015b0b0b0cccb7e379083f96e2acfe1a5ada16e47df9d2aa9385d60a6c1de9c952d439beebe8cd2a19d884f8fee6019e83c107c9ed4438f890ad2ccda794d3903075c321d5e396424f382ab5f533854d2c34782c0c32744a27e6c112eba19c56ac21d083cd9e799e1c648e8195b6e5cbd81ff8f339a9c92d23ea9781b975389837bda3c6bc5a3e6851cb568b20c5f79c0acb75e216dee75dda53370fd617ea8bd0ed889a819a14217ef005bee28e3187170506ff26cb8f0ddb1e1de286ace149ef6793dada00f7e9377e841ae48ad092ced306c8aaa511f3fcfe809048c0c422df6f4d723470a6f70adaed7084790348f3ca7a229f95e9c00a35a81f90af5fbb198f3a1cb13261c229a2eed770eaedcade73d1b7a9f0532138b36a39dfc71acd091fba26e8c2abdfbf9fdad35be5de03492308c8b6431ff1d47ee900bf21c1cdff1644306b18b41e0d4d97e0d35ad4b338680280f5c36eb02901d499a7c7418ea2b274334a2cb9d6730d0e093a8f90e21e7b57d4b8baf5b4d29d6c34b2c705f1f02075043fbcadc1153bf1ecde28598f069dcd198f92027b18a734aec883ab95c8d7838c5d2a135ed2a5fc346ef1faa70a205aab90ac7222cfe24a0eb65fb4c4c62c2b97b2967120111150aa02c7cae9289deb3c323c5da65d34b373ec196c6995150278fbb3044561dcfb22e5eddeb5a9e34fc416bfd0b30f4a1a2064b86786712d63109e0000"], 0x96c}, 0x1, 0x0, 0x0, 0x40d1}, 0x20000084) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r8, @ANYBLOB="03000000000005f5"], 0x20}}, 0x0) [ 1253.350720] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1253.372120] hfs: can't find a HFS filesystem on dev loop0 10:42:20 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4208b942"}}]}) 10:42:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x3b8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) 10:42:20 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="20000000101bad58030022ed3cd9d1fd00010800", @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) 10:42:20 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x7a00, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1253.528520] hfs: can't find a HFS filesystem on dev loop0 [ 1253.549949] device veth1177 entered promiscuous mode [ 1253.566877] device veth1177 left promiscuous mode [ 1253.586854] hfs: can't find a HFS filesystem on dev loop0 10:42:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x10) 10:42:20 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4209b942"}}]}) 10:42:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000058030000b8010000b8010000b8010000b8010000000000008802000088020000880200008802000088020000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e8000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff76657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000000"], 0x3b8) [ 1253.672410] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6928 sclass=netlink_route_socket pig=13263 comm=syz-executor.3 [ 1253.724228] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1253.756861] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6928 sclass=netlink_route_socket pig=13263 comm=syz-executor.3 [ 1253.779855] hfs: can't find a HFS filesystem on dev loop0 [ 1253.836952] device veth1177 entered promiscuous mode [ 1253.858051] hfs: can't find a HFS filesystem on dev loop0 [ 1253.872460] device veth1177 left promiscuous mode 10:42:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 10:42:20 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="2000000010000108000000000000000000010000426940e38495cd5bc3357783cffcde0f", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 10:42:20 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x1000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:20 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x17, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x4, 0x2, 0x5, 0xfffffffffffffffe, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x18bec4dee0447a03, 0x3, 0x4, 0xfffffffffffffffc, 0x8}, @ldst={0x0, 0x2, 0x2, 0x7, 0x9, 0x30}, @generic={0x2, 0x1, 0x8, 0x5, 0x6}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xb7, &(0x7f0000000100)=""/183, 0x41000, 0x0, [], 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xd, 0x10001, 0x5}, 0x10, 0x0, r0}, 0x78) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000040)=""/45) r2 = request_key(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='\x00', 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000003c0)={r2, 0xd, 0x8a}, 0x0, &(0x7f0000000400)="7dae939299397d2b1b9799f800", &(0x7f0000000440)=""/138) 10:42:20 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420ab942"}}]}) 10:42:20 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x60) [ 1254.059562] hfs: can't find a HFS filesystem on dev loop0 [ 1254.085722] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xb13eeb66c08a32ce, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000040)={0x1000, 0x0, 0xffe0}) [ 1254.124392] hfs: can't find a HFS filesystem on dev loop0 10:42:20 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420bb942"}}]}) [ 1254.187145] device veth1177 entered promiscuous mode 10:42:20 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x9, 0xc, 0x4, 0x0, 0xd0, {}, {0x4, 0xc, 0x0, 0x0, 0x2, 0x1, "ba13728c"}, 0x2, 0x2, @offset=0x7, 0x0, 0x0, 0xffffffffffffffff}) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000000)=0x2, 0x4) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x3}}, 0x20}}, 0x0) 10:42:21 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x2000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1254.247254] hfs: can't find a HFS filesystem on dev loop0 [ 1254.291011] device veth1177 left promiscuous mode [ 1254.323403] hfs: can't find a HFS filesystem on dev loop0 10:42:21 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xc0) 10:42:21 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420cb942"}}]}) [ 1254.440728] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1254.487046] hfs: can't find a HFS filesystem on dev loop0 [ 1254.560189] device veth1177 entered promiscuous mode [ 1254.574895] device veth1177 left promiscuous mode [ 1254.576125] hfs: can't find a HFS filesystem on dev loop0 10:42:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 10:42:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000000)={0x20, 0x5, 0x4, 0x1000, 0x1, {}, {0x5, 0x2, 0x3a, 0x4, 0x8, 0x40, "a6864bf5"}, 0x21e8, 0x4, @userptr=0x3, 0x8, 0x0, r0}) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r1, 0x4122, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r3 = getpid() sched_setscheduler(r3, 0x5, 0x0) r4 = getpgrp(r3) r5 = getpid() sched_setscheduler(r5, 0x5, 0x0) prlimit64(r5, 0x3, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000080)={0x0, 0x2, 0x80000000, 0x4, r4}) 10:42:21 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000340)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000380)=0xe639) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000009000000e44eedf7110000000700000ad71ae1869f0beadcf634151974bbcbb2210458fae0ed74dcfc9b3870f16f829cf5b754dfef0dd0bc2ec2f1772bea8265283b663e2bf78816f9856d0806e8414c9ad6f8e1a91c194b7db26648d6bbf0a371c543887315c3bcc42be97bee8f2f4689be0e4a7ed14dc74301f0f49230b045f931d8c1fd365542d41a13a136e937284d8ace552047831e4e4345576062db6de2d0ce536d64ece4332f5fa2f89d7e922f18e89f4d08cf83d0a161c2fb30235c297fd8b83e8a3caee615da7e210b2e"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000300)=@ccm_128={{0x304}, "fa9cd2969f0c30e0", "2009eee51589c8ea14e7607954b0b362", "468878bf", "7bc9cc1b257f0dde"}, 0x28) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) r6 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, r6) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x3}}, 0x20}}, 0x0) 10:42:21 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x3000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:21 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420db942"}}]}) 10:42:21 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xf0) [ 1254.711554] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pig=13629 comm=syz-executor.3 [ 1254.751189] hfs: can't find a HFS filesystem on dev loop0 [ 1254.762982] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1254.809720] hfs: can't find a HFS filesystem on dev loop0 10:42:21 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420eb942"}}]}) 10:42:21 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x13) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200d0088001000010800"/20, @ANYRES32=r4, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) 10:42:21 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x4000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1254.893902] device veth1177 entered promiscuous mode [ 1254.933884] device veth1177 left promiscuous mode 10:42:21 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x3b8) 10:42:21 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x300) [ 1254.957948] hfs: can't find a HFS filesystem on dev loop0 [ 1254.999105] hfs: can't find a HFS filesystem on dev loop0 10:42:21 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4210b942"}}]}) [ 1255.137799] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1255.157452] hfs: can't find a HFS filesystem on dev loop0 [ 1255.217496] hfs: can't find a HFS filesystem on dev loop0 10:42:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) 10:42:22 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10010, r0, 0x87e72000) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) r3 = gettid() r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x48a000, 0x0) sendmmsg$unix(r4, 0x0, 0x0, 0x40800) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, 0x0, 0x0) listen(r5, 0x0) r6 = getpid() fstat(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="020000000a00020000040001fffffff606000500020000"], 0x3}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e00)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)}], 0x2, 0x0, 0x0, 0x4048100}, {0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="199c342de2cfb2475fa43049d2c7402e95bd204d1fa23775e6cd1e06d7d0880bd8f3e65715a176a0359b008f60fff0d9866ffb777d95afbc9462fcafdc0726dfc8c5d7387b1b64263100911c1abd340ec31373437f1d8a09", 0x58}], 0x1, &(0x7f0000000500)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x40, 0x4004}, {&(0x7f0000000580)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000740)}, {&(0x7f00000007c0)="396f9b8f20161051958bcfc059abda636d7dc628cd78cae1b0bf6b342a735ebe272908a097a659e8aa2b76526f8724c4ab124dc90b42a2e939e1099f7dbd048d464453e77cccffb17ee5582c4b04185eb2991bb800cddd59deec6589b4ea6bf7c0568c77310769b27a9d68832f3a42259994b11d0354", 0x76}], 0x3, &(0x7f0000000600)=ANY=[@ANYRES32=r5, @ANYBLOB="5e2e815889737c2467a84cb4839a833fd6d5815a9d225e4cc5f546fc23772f2c327e522762fe46987ab7684f5b951fa2375a8283733c7dd6cc21ac5d3cb587ae2bbbd57e380a053b9e32a512332b49f4f30df2a5278bcb1ba5452e222a35e6cb877a6be382a03f9b0b722f084f9ba978cd12cf45f934ebd0cc398c8dcf3f48074f1beda69ee68ca326d56b0e7965c787708801a9107841a331808a0139b2b9c49bf36589ebf8c68f27c12b426b6a7c9fdd36c8bdda9d35e8f32660f5bb0ec2162c521ceb6162104c6c738788a34941b612cc824ee269d6298cf3ce59b288", @ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRESHEX=r8, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x114}, {&(0x7f00000009c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, 0x0}], 0x4, 0xc811) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000180)={0x4, 0x9, {r3}, {r7}, 0x2, 0x93bf}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r11, 0x3}}, 0x20}}, 0x0) 10:42:22 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = accept4(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80, 0x0) recvfrom$netrom(r1, &(0x7f0000000980)=""/4096, 0x1000, 0x40000040, &(0x7f00000000c0)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast, @bcast, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) 10:42:22 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x5000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x500) 10:42:22 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4211b942"}}]}) 10:42:22 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) [ 1255.391766] hfs: can't find a HFS filesystem on dev loop0 10:42:22 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4212b942"}}]}) [ 1255.455568] hfs: can't find a HFS filesystem on dev loop0 [ 1255.480461] device caif0 left promiscuous mode [ 1255.485413] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:22 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x6000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1255.537764] device veth1177 entered promiscuous mode 10:42:22 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000002380)=@filter={'filter\x00', 0xe, 0x4, 0x380, 0xe8, 0xe8, 0x1b8, 0x0, 0x1b8, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [0x0, 0xffffffff], 'veth0_to_bond\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [0x0, 0x0, 0xff], [0xff], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x80}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) timer_create(0x5, &(0x7f0000000180)={0x0, 0x3f, 0x4, @thr={&(0x7f0000000000)="7c3c9827ca8400446df36b103f0defe56b9ede709b901a57f26d221bac1b0956ae7a2fc77b601043629f1f6f428c5387ad80be59953631ef5a91816900ed4ace16807210c715ae4946c090ad56fe729775ac279179b79ef146511208257595786e12639019c5e0b54fdb9bf9d214186f210895e8bd01e07a625c68e6846650257edad46ac626b08a523fecab9f9d5c47caba7e44fdbd2e07598592395e2e00e7212a0c1d2713a4f86747294669dfd114237d6c6304996bc80f884d1a80b2120e2299dfdd408f943eb4fd41e2dced453c6d53406a87854643432a7fe5ba1132a7abba1c834cd58e0431a38b78e9d157b1ab5e6788", &(0x7f0000000100)="6320028ad93851895556e7059aa0a83fab949ef6573ed17bd01afd896ef5c8d93a593c5527c535d3baf7753f7d64e428196a5a5809246ddcb43b63a6dd40e5e9e97bc256350997b52dc3e5ddf48576d852f9be8d6413c7514a7f7473af1eca6bf962d26d5077bd0ad59c511adcd4d60f"}}, &(0x7f00000001c0)=0x0) timer_gettime(r2, &(0x7f0000000200)) [ 1255.578642] device veth1177 left promiscuous mode [ 1255.595341] hfs: can't find a HFS filesystem on dev loop0 10:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x600) [ 1255.677564] hfs: can't find a HFS filesystem on dev loop0 [ 1255.712069] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:22 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4214b942"}}]}) [ 1255.793100] device veth1177 entered promiscuous mode [ 1255.809780] device veth1177 left promiscuous mode [ 1255.864851] hfs: can't find a HFS filesystem on dev loop0 10:42:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 10:42:22 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000140)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000180)={r4, @in6={{0xa, 0x4e20, 0x758f, @mcast2, 0x10000}}, 0x4, 0x800, 0x9, 0x8, 0x1f}, &(0x7f0000000000)=0x98) r5 = dup(r1) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x3}}, 0x20}}, 0x0) 10:42:22 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x200) 10:42:22 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x7000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:22 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x900) [ 1255.936768] hfs: can't find a HFS filesystem on dev loop0 10:42:22 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "4222b942"}}]}) 10:42:22 executing program 4: setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x71, 0x2, 0x0, "af1c7297f700212dcf170b1fe8d06417", "dd608a4150a5cd1a9723c481c96328f18dc662f7bdfc8318328d1ab435ac05925a3d06de3b9dae93279abdc81f040170d1074fa0003046dbee8e02c3db01577eec55813cfc5e6e499e344c8fd0002f9456e58d58cf108867cea71c9f"}, 0x71, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000040)={'gretap0\x00', 0x9}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e80000000000000000000000000000000000000000dfff000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000944a0000000000000000ab29ac8000000000fe8800000000000000000000000000015b111bd336fe0001040000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454b4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000d40400000000000000000000000000002800434c415353494659000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d00000000000000000000000000000000000ff000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000"], 0x3b8) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f0000000180)={0x10, 0x0, 0x2}, 0x10) [ 1256.085973] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1256.117787] hfs: can't find a HFS filesystem on dev loop0 [ 1256.172473] Unknown ioctl 35106 10:42:22 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0xa000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1256.198575] device veth1177 entered promiscuous mode [ 1256.209366] device veth1177 left promiscuous mode [ 1256.216486] hfs: can't find a HFS filesystem on dev loop0 [ 1256.236524] Unknown ioctl 35106 10:42:23 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "422cb942"}}]}) 10:42:23 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) 10:42:23 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setpriority(0x2, r0, 0x8) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x141000, 0x0) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000480)={0x2, 0x1, 0x0, 0x1e, 0x67, &(0x7f0000000080)="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"}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f00000004c0)=0x2000, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:23 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xa00) [ 1256.389746] hfs: type requires a 4 character value [ 1256.391408] device veth1177 entered promiscuous mode [ 1256.410808] device veth1177 left promiscuous mode [ 1256.420758] hfs: unable to parse mount options 10:42:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 10:42:23 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x20000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1256.478132] hfs: type requires a 4 character value [ 1256.495539] hfs: unable to parse mount options 10:42:23 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) 10:42:23 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "423db942"}}]}) 10:42:23 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x4603, 0x1200}}, 0x20}}, 0x0) 10:42:23 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xb00) 10:42:23 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x3b8) 10:42:23 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x3f000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1256.708819] hfs: can't find a HFS filesystem on dev loop0 [ 1256.726565] device veth1177 entered promiscuous mode [ 1256.772778] hfs: can't find a HFS filesystem on dev loop0 [ 1256.780506] device veth1177 left promiscuous mode 10:42:23 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb922"}}]}) 10:42:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0x0, 0xfffffff9, 0x0, 0x7fff}, 0x0, 0x4, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r3, @ANYBLOB="030000f02e905085"], 0x20}}, 0x0) 10:42:23 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xc00) 10:42:23 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x40010000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1256.984589] device veth1177 entered promiscuous mode [ 1256.993317] device veth1177 left promiscuous mode [ 1257.014175] hfs: can't find a HFS filesystem on dev loop0 [ 1257.056277] hfs: can't find a HFS filesystem on dev loop0 10:42:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 10:42:23 executing program 4: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2200, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) listen(r3, 0x0) listen(r3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = syz_genetlink_get_family_id$smc(&(0x7f00000003c0)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r4, &(0x7f00000004c0)={&(0x7f0000000240), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, r6, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x40060) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000bbec9fad779f0c8e8f0aff78392d14bf800cbde88d5a0f848518843c2830b026119ce4a3e592fb56871933b8dc9e267034bc324f0b79", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000280)={r5, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r5}}, 0x20}}, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={@loopback, @dev={0xfe, 0x80, [], 0xd}, @dev={0xfe, 0x80, [], 0xb}, 0xfffffffc, 0x3f, 0x38d2, 0x500, 0xe, 0x4040004, r5}) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r8, 0x0) r9 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r9, 0x0) connect$bt_rfcomm(r9, &(0x7f00000002c0)={0x1f, @fixed={[], 0x10}, 0x8d}, 0xa) r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r10, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r10, 0x84, 0x77, &(0x7f0000000500)={0x0, 0xc6b, 0x4, [0xff, 0xb6, 0x9, 0xffff]}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000580)={r11, 0x1000}, &(0x7f0000000980)=0x8) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x4c, 0x12, 0x300, 0x70bd26, 0x25dfdbfc, {0x1, 0x7f, 0x0, 0x9, {0x4e20, 0x4e22, [0x3, 0x7, 0x4, 0x400], [0x9, 0x3400, 0x1, 0x6], 0x0, [0xd72]}, 0x6, 0x4}}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x20004001) 10:42:23 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) bind$isdn_base(r3, &(0x7f0000000300)={0x22, 0x1, 0x4, 0x97, 0x8}, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000100)={0xaa, 0x7fff, {0xffffffffffffffff}, {}, 0xfffffffffffffff7, 0xffffffff}) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r6, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="fc000000", @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf25250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=r5, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r1, @ANYBLOB="080001007063690011000200303030303a30303a31302e090000000008008a0084aea1e5da2bd49415a1b331f5443c0a298cc36d3dc80ad385a554f2c1302fbaf5", @ANYRES32=r6, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008c0002000000"], 0xfc}, 0x1, 0x0, 0x0, 0x8000}, 0x4009000) r7 = dup(r4) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r8, @ANYBLOB="03000000000000007f957507f80985c6671379012ac7b2c5949cf813412e7c4a87a27cbb7c61fa040a6b5ce5e22c5becfcb9466d0c61f8324d9991b130aca3f059d9926ff4ffb60292c5641932adef12c1f4ec7ad4be12bf1bf896dd3d0d2266ea8bd9d7bfb0dc0ea4adad0f9d537efafa545b29a50ed96110bb12f0eefa2162804deb5b7c613376ec398da3b1f5d6eac281774efd3842f17938b93c85ecbc63c49d00"/175], 0x20}}, 0x0) 10:42:23 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb925"}}]}) 10:42:23 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xe00) 10:42:23 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x48000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1257.270578] hfs: can't find a HFS filesystem on dev loop0 [ 1257.362082] hfs: can't find a HFS filesystem on dev loop0 [ 1257.367627] device veth1177 entered promiscuous mode [ 1257.375555] device veth1773 entered promiscuous mode 10:42:24 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb92c"}}]}) 10:42:24 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x4c000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1257.459021] device veth1773 left promiscuous mode [ 1257.478442] device veth1177 left promiscuous mode [ 1257.479332] hfs: type requires a 4 character value [ 1257.488600] hfs: unable to parse mount options [ 1257.548969] hfs: type requires a 4 character value 10:42:24 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xec0) 10:42:24 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x384400, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13801}, 0x0, 0x0, r0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000003500)={r2}) bind$isdn(r6, &(0x7f0000003540)={0x22, 0x6, 0x3}, 0x6) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}}, 0x20}}, 0x0) [ 1257.578841] hfs: unable to parse mount options 10:42:24 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb900"}}]}) [ 1257.627307] device veth1177 entered promiscuous mode [ 1257.717546] hfs: type requires a 4 character value [ 1257.730581] hfs: unable to parse mount options 10:42:24 executing program 4: ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)=0xeba) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000060000000000000072696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000001fdc3ad75590af4255ab75ead40b1ec72e6d3ba46b49b67ffe1b5d90080fce369e2b3fb9e6fe0958f42126f471bd608e2399c86fdbd8526a294b13135af09d5f30371cc585de8a7768cfc32a71e1f459ffc76411d5764c792471fc4d7243f27f2d73de7351fd7e843df9a80166c160c08f"], 0x3b8) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000480)=0x2, 0x4) 10:42:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 10:42:24 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x60000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:24 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00', @ANYRES16=r1, @ANYBLOB="00022dbd7000fddbdf2509000000"], 0x14}}, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f00000002c0)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x8, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="20000000100001c4eb225c0800"/24, @ANYRES32=r6, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) [ 1257.821944] hfs: type requires a 4 character value [ 1257.827079] hfs: unable to parse mount options 10:42:24 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}, 0x22}]}) 10:42:24 executing program 4: r0 = msgget(0x0, 0x208) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000080)=""/30) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000280)=""/214) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x134, r3, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK={0xc8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf09a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb04d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf533}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x800}]}, @TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3fd}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x44}, 0x800) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r5, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r6, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r7, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x43, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f0000000500)=ANY=[@ANYRES32, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES64=r5, @ANYRES32=r1, @ANYRES32=r0, @ANYPTR], @ANYRES32=r0], @ANYRES16, @ANYPTR, @ANYBLOB="24561c6bf26015453fb468e448a2641c2a49cceb8920c0de55f33e2f5bc289e91efaad0d7ba9cc10395d8f16ad22f228cbb89a994fa651f2f11ee293dfd6db2165070b6b5317c6f4ced649466e0ab5586f60ef1d473ee71b39713a64c386d8b50b509cec1d137435a3978181797596e4f71dc3e043e93811c6ac1cb6746663778e3baba5489a272433126626ba5732cc3c77", @ANYRESOCT=r6, @ANYRES64=r7], 0x6) 10:42:24 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xf00) [ 1258.017382] hfs: type requires a 4 character value [ 1258.017391] hfs: unable to parse mount options [ 1258.054809] hfs: type requires a 4 character value 10:42:24 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x68000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:24 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}, 0x3d}]}) [ 1258.054819] hfs: unable to parse mount options [ 1258.072823] device veth1177 entered promiscuous mode [ 1258.074929] device veth1177 left promiscuous mode [ 1258.193962] hfs: type requires a 4 character value [ 1258.193970] hfs: unable to parse mount options [ 1258.207502] nla_parse: 8 callbacks suppressed 10:42:25 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) [ 1258.207511] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1258.226847] hfs: type requires a 4 character value [ 1258.226856] hfs: unable to parse mount options [ 1258.304714] device veth1177 entered promiscuous mode 10:42:25 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=r4, @ANYBLOB="4323bf90bb0000000d0061a1fa61861b5e640010"], 0x3}}, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x34, r7, 0x1, 0x0, 0x0, {0x2}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bridge\x00'}]}, 0x34}}, 0x0) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x101080, 0x0) openat$cgroup_int(r8, &(0x7f0000000540)='cpuset.cpu_exclusive\x00', 0x2, 0x0) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r7, 0x700, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_team\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_macvtap\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x840}, 0x4008080) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r5, 0x0) syz_open_dev$usbfs(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) getsockopt$netrom_NETROM_T4(r5, 0x103, 0x6, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 10:42:25 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x68040000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:25 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x3f00) [ 1258.366600] hfs: can't find a HFS filesystem on dev loop0 [ 1258.376760] device veth1177 left promiscuous mode [ 1258.436221] hfs: can't find a HFS filesystem on dev loop0 10:42:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 10:42:25 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c5876655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000008a00400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000056dbc1f862000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x3b8) 10:42:25 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x2}) 10:42:25 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0xdac, [0x0, 0x20000980, 0x200009b0, 0x20000bae], 0x0, &(0x7f0000000000), &(0x7f0000000980)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x5, 0x12, 0x201, 'geneve1\x00', 'gretap0\x00', 'syz_tun\x00', 'ip6gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0x6e, 0x19e, 0x1ce, [], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x1, 'system_u:object_r:cpu_online_t:s0\x00'}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{0x3, 0x2, 0x17, 'wg2\x00', 'veth0_to_team\x00', 'veth0_vlan\x00', 'veth0\x00', @local, [0x7f, 0x0, 0xff, 0xff, 0x0, 0xff], @local, [0x0, 0xff, 0xff, 0xff], 0x96e, 0xaee, 0xb1e, [@nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz0\x00', 0x5}}}, @among={{'among\x00', 0x0, 0x888}, {{@offset, @offset, 0x3, {[0x101, 0x9, 0x5, 0x8000, 0x5, 0x401, 0x0, 0x0, 0x3, 0x2, 0x200, 0xfffffffd, 0xfffff041, 0x9, 0x3, 0x6, 0x81, 0x8001, 0x2a, 0x401, 0x10001, 0x6, 0x0, 0x955, 0x9, 0x4, 0xa4, 0x800, 0x7fffffff, 0x1f, 0x40, 0x6, 0x6, 0x8, 0x8, 0x8, 0x2, 0x400, 0x8, 0x400, 0x0, 0x4, 0x80000001, 0x8f95, 0x1, 0x40, 0x2, 0xb, 0x1, 0x4, 0x7, 0x7, 0x1000, 0x4, 0x9, 0x401, 0x7, 0xfffffffa, 0x3, 0xffffffff, 0x0, 0x5, 0x61c, 0x3, 0x7, 0x5, 0x200, 0x5, 0x0, 0x3, 0x5, 0x8, 0x7, 0x20, 0xe86, 0x9, 0x6, 0x0, 0x9, 0xbf, 0x6, 0x4, 0x0, 0x1, 0xbbf1, 0x6, 0x1f, 0x62, 0x5, 0xd35c, 0x1000, 0x2, 0x24000, 0x1f, 0x0, 0x8, 0x3, 0x101, 0x6, 0x1, 0xa00, 0x80000000, 0x9, 0x7fffffff, 0x7, 0x4, 0xfffffff9, 0x2, 0x4, 0xb71f, 0x400, 0x4d, 0x5a1c, 0xb96d, 0x1, 0x9, 0x80000001, 0x7ff, 0x1, 0x1, 0x6, 0x3e, 0xffff, 0x8, 0x3, 0x8, 0x6, 0x80, 0x1000000, 0x40, 0x5, 0x7fffffff, 0x5, 0x6620, 0x4, 0x8, 0xfffff288, 0x1, 0x7, 0x4, 0x6, 0x9, 0x9, 0xffffffff, 0x9, 0x7ff, 0x3ff, 0xa5, 0x3, 0x1, 0x1, 0x2, 0xf8, 0x6, 0x200, 0x5, 0xffffff80, 0x3, 0x7, 0x1ff, 0x7fff, 0xffff0001, 0xbd, 0x1ff, 0x3, 0x1, 0x4, 0x81, 0xfff, 0x7f, 0x7f, 0x80000001, 0x3, 0xfff, 0x4, 0xc6, 0x7f, 0x800, 0x10000, 0x46209b61, 0x4, 0x2c, 0x0, 0x80000001, 0x1, 0x8, 0x1ff, 0xfff, 0xf3, 0xffffffff, 0x1, 0x489, 0x9, 0x3, 0xa00, 0x1, 0x6, 0x200, 0xfff, 0x8, 0x80000001, 0xfffffff7, 0x4, 0x1, 0x800, 0x0, 0x3, 0x7, 0xff, 0x8, 0x56b3, 0x3, 0x2, 0x2, 0x6, 0x3, 0x7, 0x2, 0xee, 0x2, 0x101, 0x1f, 0x7, 0x10000, 0x5, 0x1, 0x9, 0x5, 0x9, 0x8, 0x35, 0x2, 0xaa, 0xcaf, 0x7fffffff, 0x8, 0x4, 0x7ff, 0x7, 0x0, 0xfffffffa, 0x91a7b7ac, 0xff, 0x9, 0x7, 0x9, 0x7, 0xfffffff7, 0xffff, 0xa2b, 0x8000, 0x1f, 0x6, 0x6, 0xa679, 0x10000, 0x3], 0x2, [{[0x9, 0x5], @dev={0xac, 0x14, 0x14, 0x41}}, {[0x6, 0x101], @rand_addr=0x4}]}, {[0x8, 0x9, 0x6, 0xffff, 0x6, 0x7, 0x5, 0x0, 0x3, 0x254, 0x0, 0x800, 0xfa, 0x14f6, 0x0, 0x0, 0x200, 0x4, 0x80000001, 0x2b, 0x2e5, 0xed03, 0xd659, 0x3, 0x9, 0x5, 0x5, 0x4, 0x8000, 0x7, 0x8001, 0x6, 0xc70, 0x8, 0x4, 0x8, 0x1, 0x1ff, 0xfffffffb, 0x81, 0x3f, 0x6, 0x8, 0x74, 0xc33, 0x8, 0x0, 0x2, 0x4, 0x7f, 0xa76a, 0x1, 0x2, 0x9, 0x4, 0x80, 0x8, 0x6, 0xfffff3f2, 0x1f, 0x4, 0x8, 0x1, 0x2, 0xffffffff, 0x2, 0xfffffffb, 0x6, 0x1, 0xfffffff1, 0x80000000, 0x100, 0x5, 0x3, 0x5, 0x2, 0x7fff, 0x8adc, 0xfffffffd, 0xf74a, 0x1, 0x3f, 0x9, 0x2, 0x9, 0x1000, 0x10001, 0x3, 0x1f, 0xbeb, 0x5, 0x3, 0x32dc00, 0xd142, 0xfff, 0x7fffffff, 0x400, 0x5, 0x5, 0xaf, 0xfffffff9, 0x9, 0x8000, 0xb7d, 0x8001, 0x8001, 0xc4, 0x0, 0x3, 0x5, 0x7, 0xffffffff, 0x7, 0x1000, 0x7ff, 0x9, 0xffffff80, 0x4, 0x3b1af95b, 0x800, 0x0, 0x0, 0x3f, 0xfffffff7, 0x0, 0x80, 0x3, 0x3, 0x7, 0x29, 0xfffffffc, 0x1, 0x8, 0x1000, 0x7f, 0x7, 0x0, 0x83d, 0xe0000000, 0x0, 0xe9, 0x94c9, 0xff, 0x1f, 0x200, 0x1000, 0xa0d0, 0x7ff, 0xed79, 0x7f, 0x1, 0x6, 0x8, 0x1, 0x2, 0xff, 0x5, 0x4, 0x3, 0xffffffc0, 0x400, 0xf02, 0x4, 0x4, 0xfffffffd, 0x7, 0x1ff, 0x6, 0x1, 0x6, 0x101, 0x166, 0x6, 0x0, 0x7, 0x81, 0x80, 0xfffffff8, 0x81, 0x0, 0x10001, 0x22, 0xa64, 0xff, 0x3, 0xee98, 0x8, 0x5, 0x7, 0x7fffffff, 0x4, 0x6, 0x9, 0x17cc, 0xfff, 0x1b6, 0x5, 0x4b, 0x0, 0x49, 0x6, 0x8001, 0x9, 0x54, 0x2, 0xfff, 0x9, 0xa17, 0x10000000, 0x0, 0x7, 0x0, 0xfffffff7, 0xffffff37, 0x1ff, 0x8, 0x6, 0x5, 0x8, 0x200, 0x30d, 0x4, 0x243, 0x37, 0x1, 0x53c, 0x80, 0x40, 0x7, 0x1, 0x9, 0x1, 0x8, 0x3ccd, 0x2, 0x9, 0x7f, 0x2, 0x401, 0x0, 0x1, 0x10001, 0x8, 0x20a82453, 0x0, 0x0, 0x5, 0x7f, 0x9, 0x1ff, 0x691a, 0xffff, 0x4, 0xfffffc42, 0x4, 0x9, 0x8000], 0x7, [{[0x3f, 0x1], @multicast2}, {[0x381, 0x5], @multicast1}, {[0x5, 0xfffffffe], @loopback}, {[0x5, 0x7c7f], @multicast2}, {[0xffff7fff, 0x3ff], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x6, 0x40], @multicast2}, {[0x2, 0x1], @remote}]}}}}], [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0xa9ae, {0x6}}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3add, 'system_u:object_r:man_t:s0\x00'}}}], @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}}]}]}, 0xe24) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:25 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) getrandom(&(0x7f0000000180)=""/142, 0x8e, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x100, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x0) 10:42:25 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x4000) [ 1258.591929] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:25 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x6c000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1258.687698] hfs: unable to parse mount options [ 1258.704600] device veth1177 entered promiscuous mode [ 1258.734679] device veth1177 left promiscuous mode [ 1258.763691] hfs: unable to parse mount options 10:42:25 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/policy\x00', 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f00000004c0)={0x20, 0x0, 0x7, {0x1000, 0x4, 0x6, 0x81}}, 0x20) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x43, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) r3 = dup(r2) getsockopt$inet6_dccp_int(r3, 0x21, 0x1, &(0x7f0000000500), &(0x7f0000000540)=0x4) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x90) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f0000000400)={0x2, 0x3f5, {0x56, 0x6, 0x3, {0x2, 0xa2}, {0x327e, 0x650}, @cond=[{0x8, 0x3, 0x1, 0x5, 0x7, 0x5}, {0x7f, 0x5, 0x4, 0x6, 0x81, 0x3}]}, {0x54, 0x4, 0x8, {0x4, 0x5}, {0x5, 0x6}, @period={0x5c, 0x0, 0x800, 0xd8, 0x7, {0x4, 0xff81, 0x712, 0xd6}, 0x7, &(0x7f00000003c0)=[0x5, 0x0, 0x2, 0x2f0, 0x2, 0x80, 0xc97b]}}}) 10:42:25 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) ioctl$SG_GET_VERSION_NUM(r4, 0x2282, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001002010800"/20, @ANYRES32=r3, @ANYBLOB="e1ffffffffffffff"], 0x20}}, 0x0) 10:42:25 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x3}) 10:42:25 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x5865) [ 1258.827171] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1258.925615] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=528 sclass=netlink_route_socket pig=15327 comm=syz-executor.3 [ 1258.945133] hfs: unable to parse mount options [ 1258.949475] device veth1177 entered promiscuous mode [ 1258.956561] device veth1177 left promiscuous mode [ 1259.002737] hfs: unable to parse mount options [ 1259.008242] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=528 sclass=netlink_route_socket pig=15399 comm=syz-executor.3 10:42:25 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x70030000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x1f000000}, 0x0) 10:42:25 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) accept(r0, &(0x7f0000000040)=@xdp, &(0x7f00000000c0)=0x80) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x9) 10:42:25 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x4}) 10:42:25 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f00000001c0), 0xfffffffffffffec5) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000180)=""/47) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x3}}, 0x20}}, 0x0) [ 1259.162681] hfs: unable to parse mount options [ 1259.180809] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1259.209450] hfs: unable to parse mount options 10:42:26 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x6000) 10:42:26 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x5}) 10:42:26 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x701041, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000100)={{0x5, 0xf3}, 'port1\x00', 0x8d, 0x400, 0x240, 0x99ab, 0x5, 0x10001, 0x81, 0x0, 0x2, 0x6}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) 10:42:26 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x0) [ 1259.344390] hfs: unable to parse mount options 10:42:26 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x74000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:26 executing program 4: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x420280, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 1259.416600] hfs: unable to parse mount options [ 1259.422612] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:26 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x6}) [ 1259.588301] device veth1177 entered promiscuous mode [ 1259.591049] hfs: unable to parse mount options [ 1259.594944] device veth1177 left promiscuous mode 10:42:26 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x6558) [ 1259.658900] hfs: unable to parse mount options 10:42:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 10:42:26 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x7a000000, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:26 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000004c0)={0x5, 0x8, 0x4, 0x1, 0x5, {0x77359400}, {0x1, 0x1c, 0x8, 0xfd, 0x3f, 0x4, "692aa4da"}, 0x8, 0x4, @fd, 0xffffff62, 0x0, r3}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000980)="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") syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') 10:42:26 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x7}) 10:42:26 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000010000108000000000000000000000000850f2a027d050412dbb4045710e34c4701b45619b2670da9a4", @ANYRES32, @ANYBLOB="4764ada6e3d059d193a2142cb3489109ce6fa53daabb8dd100bb37"], 0x20}}, 0x0) [ 1259.805104] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1259.843810] hfs: unable to parse mount options 10:42:26 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) connect$caif(r1, &(0x7f0000000000)=@dgm={0x25, 0x7, 0x7f}, 0x18) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 1259.918616] hfs: unable to parse mount options 10:42:26 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x8100) 10:42:26 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x9}) [ 1259.997313] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:26 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0xffffff7f, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:26 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = gettid() fcntl$setown(r0, 0x8, r1) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x3}}, 0x20}}, 0x0) [ 1260.074468] hfs: unable to parse mount options [ 1260.089571] device veth1177 entered promiscuous mode [ 1260.118469] device veth1177 left promiscuous mode [ 1260.129631] hfs: unable to parse mount options 10:42:26 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0xa}) 10:42:27 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xc000) [ 1260.263382] hfs: unable to parse mount options 10:42:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x35040000}, 0x0) 10:42:27 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x140, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:27 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, 0x0) rt_tgsigqueueinfo(r1, r2, 0x40, &(0x7f0000000400)={0x2c, 0xfffffffb, 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xe8, 0xe8, 0x0, 0x0, 0x1b8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [0x0, 0xffffff00, 0xffffffff], [], 'rose0\x00', 'bridge_slave_1\x00', {}, {0xff}}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0x0, 0xffffff00], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x1, 0x0, 0x5}, {0x0, 0x1, 0x4}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 1260.317800] hfs: unable to parse mount options [ 1260.365888] x_tables: duplicate underflow at hook 2 10:42:27 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000001c0)={{0x32, @empty, 0x0, 0x0, 'none\x00'}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7b2d3f17}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[], 0xffffffa8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@int=0xaf, 0x4) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}}, 0x20}}, 0x0) 10:42:27 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aeff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e8000000000000000000000000000000000000000000000000004000524154454553540000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c415353494659000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000790000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000000"], 0x3b8) 10:42:27 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x22}) [ 1260.388828] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1260.488251] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 [ 1260.507764] hfs: unable to parse mount options [ 1260.555292] device veth1177 entered promiscuous mode [ 1260.567666] hfs: unable to parse mount options [ 1260.574062] device veth1177 left promiscuous mode 10:42:27 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x30a, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:27 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000280)={0x9, 0xc, 0x4, 0x40000, 0xf8, {0x77359400}, {0x4, 0x2, 0x0, 0x6, 0xff, 0x0, "c1882497"}, 0x100000, 0x2, @userptr=0x6, 0x8, 0x0, 0xffffffffffffffff}) pread64(r2, &(0x7f0000000300)=""/224, 0xe0, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000080)={0x20, 0x4, 0x4, 0x70000, 0x9, {}, {0x4, 0x0, 0x23, 0x52, 0x8, 0xb1, "c71be2e8"}, 0xbace, 0x4, @planes=&(0x7f0000000040)={0x7, 0x8, @mem_offset=0x8001, 0x1}, 0x1ff, 0x0, 0xffffffffffffffff}) r4 = getpid() sched_setscheduler(r4, 0x5, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000200)={0xa00000, 0x4, 0xd3, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0xa00903, 0x400, [], @p_u32=&(0x7f0000000180)=0x400}}) r8 = socket$netlink(0x10, 0x3, 0xe) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r6, &(0x7f0000000240)={r7, r8}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0xe8, 0x1b8, 0x1b8, 0xe8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@local, @rand_addr="4d571af392e25f5c56e558e8d204c452", [], [], 'rose0\x00', 'bridge_slave_1\x00', {}, {0xff}}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0xffffff00], 'rose0\x00', '\x00', {}, {}, 0x0, 0x10}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [0x0, 0xffffff00], [0x0, 0x0, 0xffff00], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 1260.604688] device dummy0 left promiscuous mode 10:42:27 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x23}) 10:42:27 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xc00e) [ 1260.702448] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1260.718524] hfs: unable to parse mount options [ 1260.781013] hfs: unable to parse mount options 10:42:27 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x468, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 10:42:27 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x2c}) 10:42:27 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="2802060062", @ANYRES16=r3, @ANYBLOB="000227bd7000fcdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000840}, 0x4001) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) [ 1260.908965] x_tables: duplicate underflow at hook 2 10:42:27 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xf000) [ 1260.947448] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1261.019500] hfs: can't find a HFS filesystem on dev loop0 [ 1261.098858] device veth1179 entered promiscuous mode [ 1261.111133] hfs: can't find a HFS filesystem on dev loop0 [ 1261.127649] device veth1179 left promiscuous mode [ 1261.261775] device veth1179 entered promiscuous mode [ 1261.268721] device veth1179 left promiscuous mode [ 1261.304562] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 10:42:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000180)) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x3}}, 0x20}}, 0x0) 10:42:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x115003, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000040)=0xff, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 10:42:28 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x48}) 10:42:28 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x140, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:28 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xff03) 10:42:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) [ 1261.449902] hfs: unable to parse mount options [ 1261.465433] x_tables: duplicate underflow at hook 2 10:42:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000000)=ANY=[@ANYBLOB="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"/967], 0x3b8) [ 1261.525523] hfs: unable to parse mount options [ 1261.565229] device veth1179 entered promiscuous mode 10:42:28 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x4c}) 10:42:28 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x33fe0) [ 1261.605067] device veth1179 left promiscuous mode 10:42:28 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x30a, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1261.674554] hfs: unable to parse mount options 10:42:28 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f0000000040)=0x3) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 1261.721926] hfs: unable to parse mount options 10:42:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KDFONTOP_COPY(r4, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = getpid() r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r7, 0x0) sendmsg$IPSET_CMD_ADD(r7, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x60, 0x9, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x60}}, 0x40) syz_open_procfs(r6, &(0x7f0000000500)='cgroup\x00') sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r5, @ANYBLOB="0300ffeaa04bff0000c9696898e3e710eaede24b47bd21b5025d4dd574c73977a8b4034b6208cc4d32c731de1cdb"], 0x20}}, 0x0) [ 1261.755802] x_tables: duplicate underflow at hook 2 10:42:28 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x60}) [ 1261.856395] hfs: unable to parse mount options 10:42:28 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x468, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1261.879370] device veth1179 entered promiscuous mode [ 1261.920630] hfs: unable to parse mount options 10:42:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x48000000}, 0x0) 10:42:28 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x34000) 10:42:28 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x68}) [ 1262.065807] x_tables: duplicate underflow at hook 2 [ 1262.079408] hfs: unable to parse mount options [ 1262.138997] hfs: unable to parse mount options 10:42:28 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x6c}) [ 1262.262807] device veth1179 entered promiscuous mode 10:42:29 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x140, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1262.292005] device veth1179 left promiscuous mode [ 1262.300200] hfs: unable to parse mount options 10:42:29 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x40000) 10:42:29 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) connect$can_bcm(r1, &(0x7f0000000000), 0x10) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r6, 0x0) setsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000180)=0x1, 0x2) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x3}}, 0x20}}, 0x0) 10:42:29 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000009c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000040000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d00000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000d037852ed63983ed4be077d4ce2b2d00000000000000feffffff00000000"], 0x3b8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x10101, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000240)={0x4, 0x0, 0x6}) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x280c40, 0x0) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00') setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000280)=0x8, 0x8) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="6ffe000000000000000003000000180001800d0001007587703a73797a3100000049c6db80c13f0004000280"], 0x2c}}, 0x0) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000600)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000300)={0x2bc, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xe60e99c}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xb9}]}, @TIPC_NLA_LINK={0x6c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x5c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x36}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x440}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3720}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0xe8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x101}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffff91}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8d}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xdb2}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x2bc}, 0x1, 0x0, 0x0, 0x4000}, 0x4010) sendmsg$SMC_PNETID_ADD(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa0, r3, 0x9, 0x70bd2a, 0x25dfdbfc, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gre0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_vlan\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0xa0}, 0x1, 0x0, 0x0, 0x8000}, 0x4008000) [ 1262.406647] x_tables: duplicate underflow at hook 2 [ 1262.445946] hfs: unable to parse mount options 10:42:29 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x74}) 10:42:29 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x400300) 10:42:29 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:42:29 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x30a, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x4c000000}, 0x0) [ 1262.642334] hfs: unable to parse mount options [ 1262.667611] x_tables: duplicate underflow at hook 2 10:42:29 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000000)={0x3f, 0xfff}) 10:42:29 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000001c0)={{0x32, @empty, 0x0, 0x0, 'none\x00'}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7b2d3f17}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0xffffffa8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f00000001c0)={{0x32, @empty, 0x0, 0x0, 'none\x00'}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7b2d3f17}}, 0x44) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000240)={0x8001, 0x3, {0xffffffffffffffff}, {0xee00}, 0x200000000000000, 0x3}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) setuid(r7) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0\x00', r7, r8) r9 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x48a000, 0x0) sendmmsg$unix(r9, 0x0, 0x0, 0x40800) r10 = socket$unix(0x1, 0x1, 0x0) bind$unix(r10, 0x0, 0x0) listen(r10, 0x0) r11 = getpid() fstat(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="020000000a00020000040001fffffff606000500020000"], 0x3}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e00)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000400)}, {&(0x7f00000001c0)}], 0x2, 0x0, 0x0, 0x4048100}, {0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="199c342de2cfb2475fa43049d2c7402e95bd204d1fa23775e6cd1e06d7d0880bd8f3e65715a176a0359b008f60fff0d9866ffb777d95afbc9462fcafdc0726dfc8c5d7387b1b64263100911c1abd340ec31373437f1d8a09", 0x58}], 0x1, &(0x7f0000000500)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12}}}], 0x40, 0x4004}, {&(0x7f0000000580)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000740)}, {&(0x7f00000007c0)="396f9b8f20161051958bcfc059abda636d7dc628cd78cae1b0bf6b342a735ebe272908a097a659e8aa2b76526f8724c4ab124dc90b42a2e939e1099f7dbd048d464453e77cccffb17ee5582c4b04185eb2991bb800cddd59deec6589b4ea6bf7c0568c77310769b27a9d68832f3a42259994b11d0354", 0x76}], 0x3, &(0x7f00000010c0)=ANY=[@ANYRES32=r10, @ANYRES32=r9, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRESHEX=r13, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x3a}, {&(0x7f00000009c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}], 0x4, 0xc811) write$P9_RSTATu(r3, &(0x7f0000000280)={0x7c, 0x7d, 0x2, {{0x0, 0x62, 0x4, 0x5, {0x4, 0x2, 0x5}, 0x900000, 0xffff8001, 0x1, 0xfff, 0x1d, '/selinux/avc/cache_threshold\x00', 0x3, 'nv\x00', 0x5, '{self', 0xa, '-\x89system!['}, 0x5, 'none\x00', r5, r8, r12}}, 0x7c) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[], 0xffffffa8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x9, 0x7ff}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={r14, 0x7}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = dup(r15) getsockname$packet(r16, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r17, 0x3}}, 0x20}}, 0x0) [ 1262.689973] hfs: unable to parse mount options 10:42:29 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0x7a}) [ 1262.749099] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 [ 1262.812749] device veth1181 entered promiscuous mode [ 1262.818618] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 [ 1262.851741] device veth1181 left promiscuous mode 10:42:29 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) 10:42:29 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xf0ffff) [ 1262.871164] hfs: unable to parse mount options 10:42:29 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1262.921317] hfs: unable to parse mount options 10:42:29 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r3, @ANYBLOB="0000100100000000"], 0x20}}, 0x0) 10:42:29 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000100000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x3b8) 10:42:29 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}], [], 0xff}) [ 1263.007300] x_tables: duplicate underflow at hook 2 [ 1263.040698] hfs: unable to parse mount options [ 1263.097567] hfs: unable to parse mount options 10:42:29 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2001, 0x0) [ 1263.129864] device veth1181 entered promiscuous mode [ 1263.142993] device veth1181 left promiscuous mode [ 1263.223679] hfs: can't find a HFS filesystem on dev loop0 [ 1263.283252] hfs: can't find a HFS filesystem on dev loop0 10:42:30 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000000)={0x95a, "881797aee97fbfff901c9e42f9e36c310cc379ec86af472930a9e311e0c5c132", 0x1}) [ 1263.406430] hfs: can't find a HFS filesystem on dev loop0 [ 1263.626511] hfs: can't find a HFS filesystem on dev loop0 10:42:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 10:42:30 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x140, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:30 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x1000000) 10:42:30 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000040)={0x0, 0xff, 0x3, [], &(0x7f0000000000)=0x1}) 10:42:30 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./bus\x00', 0x0, 0xc}, 0x10) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000200ff011600020206009dca2f7ea8a814ad54d5296766abef45ff629633c2cdb5ee6dc8495cdd4b9eb7f6d02517d4b170678ac7486cee0c21e671ed40adcdacc19ec89bd0f11791287bf4e7615873479b67d35a228fd563d9050866bb0f60bb819216d9d3f3558394bfd4ce5676d60e8eb4a1454b639f384baa5294ee63fb0016eb92bc260ab63b548762911f45b6df1fae4f76e9c69cc262a858f6047ebe0cd63883f21a0e26130717979e0f4b1a81c536942b3deeaa"], &(0x7f00000000c0)=0xe) [ 1263.731879] x_tables: duplicate underflow at hook 2 10:42:30 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x1, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000010000106000000000400000000000000", @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) [ 1263.777187] nla_parse: 7 callbacks suppressed [ 1263.777197] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1263.813092] hfs: can't find a HFS filesystem on dev loop0 10:42:30 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x2000) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000000c0)={0x2, 0x3}, 0x2) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ipvlan0\x00'}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 1263.885973] hfs: can't find a HFS filesystem on dev loop0 [ 1263.910975] device veth1181 entered promiscuous mode [ 1263.927503] device veth1181 left promiscuous mode 10:42:30 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="747970653d420fb9422c002d940f750dc069a40ce2d34de9b7277d27d9c2f673629c2c0b111b2a9262330bcbd7306ffe772031504d6c0a1b75f6136482991dd119d14ea972169cda"]) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xc001, 0x0) bind$l2tp6(r0, &(0x7f0000000140)={0xa, 0x0, 0x6, @remote, 0x8, 0x3}, 0x20) 10:42:30 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:30 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 10:42:30 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000180)={0x5, 0x0, [{0x7, 0x6, 0x3, 0x0, 0x3, 0x18, 0x74c8}, {0x80000007, 0x401, 0x3, 0xcdb2, 0x8, 0xc4f, 0x6}, {0xc0000000, 0x3, 0x4, 0x4, 0x2, 0x0, 0x5}, {0xd, 0x0, 0x2, 0x6, 0x7, 0x4}, {0x80000000, 0x9, 0x1, 0x4, 0x6, 0x5, 0x9}]}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}}, 0x20}}, 0x0) 10:42:30 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x2000000) [ 1264.069666] hfs: can't find a HFS filesystem on dev loop0 [ 1264.085230] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1264.150515] hfs: can't find a HFS filesystem on dev loop0 10:42:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) 10:42:31 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2104008, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) exit_group(0x8) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000001c0)={0x4656, 0x5, {r1}, {0xffffffffffffffff}, 0x44f, 0x80}) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x4, &(0x7f0000000200)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x8}}], [{@euid_eq={'euid', 0x3d, r2}}, {@audit='audit'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}]}) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {}]}) [ 1264.346525] x_tables: duplicate underflow at hook 2 10:42:31 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x1b8, 0xe8, 0xe8, 0xe8, 0xe8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x80, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [0x0, 0x0, 0xff000000], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xfffffffffffffca0) [ 1264.423713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1264.430962] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:31 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1000002, 0x40010, r1, 0x800000) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e23, 0xcc, @local, 0x9}}, 0x0, 0x0, 0x4f, 0x0, "b6599500d09d58d6aa025ebc35df2931dd662b7fa4cf35b34bcafba1f521a45210496533a08e189a1347b48b7e808a26631b92299a48710d18c54c146bfd647b464250ca9dd40d4db6d530f03c51e536"}, 0xd8) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) [ 1264.538684] device veth1183 entered promiscuous mode 10:42:31 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000002305274b45948af5528e000000000e000000040000005803000000000000000000007003000070030000700300006804000068040000680400006804000068040000040000000000000000000000fe8000000000000000000000000000aaff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006272696467655f736c6176655f3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e800000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000fe8800000000000000000000000000015b111bd336fe000104000000000000000000000000000000000000000000000000000000000000000000000000000000726f7365300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/936], 0x3b8) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0x2177, 0x3, 0x4, 0x0, 0x1f, {}, {0x2, 0x2, 0x5, 0x2, 0x3f, 0x0, "d4d2b990"}, 0x0, 0x4, @userptr=0x100, 0x100, 0x0, r1}) ioctl$RTC_PIE_OFF(r2, 0x7006) [ 1264.578892] device veth1183 left promiscuous mode [ 1264.593444] hfs: can't find a HFS filesystem on dev loop0 10:42:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="2017009bb68006fd266ca556b91d86e420001000", @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) 10:42:31 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x40a, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:31 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x3000000) [ 1264.662407] hfs: can't find a HFS filesystem on dev loop0 [ 1264.698108] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32950 sclass=netlink_route_socket pig=17315 comm=syz-executor.3 [ 1264.730626] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:31 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x425, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1264.737660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32950 sclass=netlink_route_socket pig=17315 comm=syz-executor.3 10:42:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r4, @ANYBLOB="f25119136551acca"], 0x20}}, 0x0) 10:42:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x68000000}, 0x0) 10:42:31 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x3b8) [ 1264.968394] device bond0 entered promiscuous mode [ 1264.986722] device bond_slave_0 entered promiscuous mode 10:42:31 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x4000000) [ 1265.009547] device bond_slave_1 entered promiscuous mode [ 1265.750685] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1265.852847] device veth1185 entered promiscuous mode [ 1265.869616] device veth1185 left promiscuous mode [ 1265.999716] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x7) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@phonet, &(0x7f0000000000)=0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) 10:42:32 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x5000000) 10:42:32 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x140, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x6c000000}, 0x0) 10:42:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="96843b75d9be01d400"/20, @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) [ 1266.349263] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1266.407089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48857 sclass=netlink_route_socket pig=17665 comm=syz-executor.3 10:42:33 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x370, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1266.495460] device veth1187 entered promiscuous mode [ 1266.531332] device veth1187 left promiscuous mode [ 1266.536401] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48857 sclass=netlink_route_socket pig=17665 comm=syz-executor.3 10:42:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4a8440, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r3 = msgget(0x3, 0x0) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000180)=""/230) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r9 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r9, 0x107, 0x1, &(0x7f0000000280)={r8, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r8}}, 0x20}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r4, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xcc, 0x12, 0x0, 0x70bd2b, 0x2, {0x23, 0x3, 0x29, 0x3, {0x4e24, 0x4e21, [0x9, 0x3db, 0x7, 0x101], [0x80000000, 0x7, 0x3, 0x7], r8, [0x40, 0x81]}, 0x0, 0x1}, [@INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "cbdeca2e88df01274475e76901d1f126a9905babfdc35cb63bed225528790ea633752a8fb3af570067711a42db51b8ac6584c0680c1214350805456e288d760fac00b5f009b46c7d4593222eb15d5520463d3601ea8b4a26f1589fcc2ea552c9d9f74313159e695073196bba82830ca905b0aa36110962fb5c"}]}, 0xcc}, 0x1, 0x0, 0x0, 0x50}, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x10, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xb7}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 1266.673562] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:33 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x6000000) 10:42:33 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x40a, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x80) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f00000001c0)={{0x32, @empty, 0x0, 0x0, 'none\x00'}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7b2d3f17}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$binfmt_elf64(r4, &(0x7f0000000400)=ANY=[], 0xffffffa8) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000140)={r6}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000000)={r6, 0x6bb, 0x5}, &(0x7f0000000180)=0x8) [ 1266.807719] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1266.990662] device veth1775 entered promiscuous mode [ 1267.021936] device veth1775 left promiscuous mode [ 1267.058996] device bond0 left promiscuous mode [ 1267.070495] device bond_slave_0 left promiscuous mode 10:42:33 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x425, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1267.100749] device bond_slave_1 left promiscuous mode [ 1267.111480] 8021q: adding VLAN 0 to HW filter on device bond0 10:42:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x74000000}, 0x0) 10:42:33 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x8000000) [ 1267.203916] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 10:42:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x0) 10:42:34 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x140, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1267.404279] device veth1775 entered promiscuous mode [ 1267.415692] device veth1187 entered promiscuous mode [ 1267.427360] device veth1775 left promiscuous mode 10:42:34 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) pkey_free(r0) [ 1267.522119] device veth1187 left promiscuous mode 10:42:34 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000280)={0x3, r0, 0x1}) close(r2) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000180)={@empty, 0x0}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=@newtclass={0x468, 0x28, 0x2, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x9, 0xfff3}, {0x4, 0xc}, {0xb, 0xb}}, [@tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x420, 0x2, [@TCA_CBQ_LSSOPT={0x18, 0x1, {0x3d, 0x3, 0x1b, 0x9, 0xc6ee, 0x4346, 0x8a, 0x7}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x3ff, 0x7, 0x2, 0x9, 0x3a, 0x330d, 0xfffff001, 0x5821, 0x200, 0x5, 0x9, 0x6, 0x7, 0x3, 0x4, 0x5, 0x4, 0x3f, 0x8, 0x1, 0x7, 0x80000001, 0x8, 0x4, 0x3ff, 0x7ff, 0x8, 0x1, 0x1, 0x1f, 0x2, 0x8001, 0x7ff, 0x2, 0x9, 0x7, 0x60000000, 0x0, 0x3, 0x0, 0xfffff575, 0xfffffc00, 0x603c, 0x4, 0xfffffffd, 0x8, 0xf3f, 0x5, 0x355, 0x4, 0xfffffffc, 0x6, 0x8001, 0x10000, 0x1, 0x0, 0xb33, 0x1f, 0x4e177a32, 0x0, 0x80d9, 0x6, 0x1, 0x1, 0x9, 0x40, 0xd1, 0x7, 0x3, 0xef5f, 0x400, 0x5, 0x80000001, 0x100, 0x6dc6, 0x8, 0x10000, 0x8001, 0x6624, 0x0, 0x2, 0x80, 0xff, 0x1, 0x200, 0x7f, 0x20, 0x4, 0x1, 0x6, 0x2, 0xa7, 0xffffffdc, 0x1000, 0x8001, 0x3, 0x0, 0x3, 0xfffffffa, 0x8, 0x1, 0x92e, 0x9, 0xc7, 0x1, 0x6, 0x9, 0x2, 0x1, 0x4, 0x1, 0x0, 0x400, 0x8, 0x6, 0x1000, 0x43e, 0x288, 0xc9f2, 0x8001, 0x2, 0x7f, 0xc56b, 0x0, 0x0, 0xfff, 0x80000000, 0x9, 0x3, 0x5, 0x9, 0x100, 0x4, 0x2, 0x7ff, 0x800, 0x2, 0x80000000, 0x100, 0x1, 0x4a2, 0x8001, 0x1, 0x0, 0x7, 0x100, 0x7, 0x10001, 0x7fffffff, 0x80, 0x5, 0x40, 0x8, 0x6, 0x3, 0x2, 0xfffffffe, 0xfffffffc, 0x0, 0x4d, 0x0, 0x8001, 0x80, 0x7f, 0x7, 0x80000000, 0x20, 0xffffffa6, 0x1, 0x1, 0x6, 0x7f, 0x8, 0x101, 0x101, 0x0, 0x6, 0x7fff, 0xfffffffb, 0x8001, 0x3d68, 0xedd, 0x9, 0x2, 0x2, 0xa2, 0x3, 0xff, 0x9, 0x80000001, 0x100, 0x3, 0x0, 0x2, 0x4, 0x401, 0x2, 0x7, 0x60, 0x101, 0x471a0f59, 0x1, 0x41, 0xba, 0x6, 0x0, 0x3, 0xff, 0x4, 0x6fe, 0x10000, 0x7, 0x8, 0x8, 0x0, 0xfe, 0x9, 0x7, 0x8b, 0x2, 0xbcc, 0xa2, 0x9, 0x9, 0x401, 0x9, 0x7, 0x2, 0x80, 0x0, 0xab, 0x4, 0x5, 0x9, 0x7ff, 0x7, 0x5, 0x9, 0x6, 0x3, 0x3, 0x7f, 0x8f15, 0x2, 0x1, 0x1, 0xfff, 0x6, 0x0, 0x49a8, 0x0, 0x100, 0xfff, 0x8f, 0x0, 0x5]}]}}, @TCA_RATE={0x6, 0x5, {0x7, 0xed}}, @TCA_RATE={0x6, 0x5, {0x6, 0x74}}, @tclass_kind_options=@c_prio={0x9, 0x1, 'prio\x00'}]}, 0x468}, 0x1, 0x0, 0x0, 0x40000}, 0x10) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r8, @ANYBLOB="1600000023000000"], 0x20}}, 0x0) 10:42:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0xe8, 0x1b8, 0x1b8, 0x1b8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [0x0, 0x0, 0x0, 0x1fffffffe], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) [ 1267.578519] hfs: can't find a HFS filesystem on dev loop0 [ 1267.653001] hfs: can't find a HFS filesystem on dev loop0 10:42:34 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x9000000) 10:42:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x1b8, 0x1b8, 0x0, 0xe8, 0xe8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00', {}, {}, 0x0, 0xfe}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x0, {0x400000000000}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x40a) 10:42:34 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x20000, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x10001) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@type={'type', 0x3d, "cf9d23a0"}}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'eth0eth1)selinuxselfselinux'}}, {@smackfshat={'smackfshat', 0x3d, '\x00\x00\x00\x00\x00\x00'}}]}) [ 1267.837761] hfs: unable to parse mount options 10:42:34 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="74797096f3420fb9422c00"]) [ 1268.010087] hfs: unable to parse mount options [ 1268.071477] hfs: unable to parse mount options 10:42:34 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r1, @ANYBLOB="04002abd7000fedbdf2516000000ac00028044000380080002000000000008000200000000000800010004000000080002000100000008000100000800000800010009000000080002007f000000080002003f0000001400038008000200ff0100000800010009000000040004000800020001000000080001000000000004000400040004002c000380080001008bf9ffff08000200030000000800020031d800000800c9080000000008000200fdffffff08000200000200000c0007800800020005000000"], 0xcc}}, 0x800) [ 1268.211458] device veth1187 entered promiscuous mode [ 1268.219061] device veth1187 left promiscuous mode [ 1268.227980] hfs: can't find a HFS filesystem on dev loop0 10:42:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 10:42:35 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x370, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x7) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@phonet, &(0x7f0000000000)=0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) [ 1268.290073] hfs: can't find a HFS filesystem on dev loop0 10:42:35 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000000180)=""/179, 0xb3}], 0x1, 0x9) r3 = dup(r1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x498100, 0x0) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8003}}, 0x20}}, 0x0) 10:42:35 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xa000000) 10:42:35 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0xc4, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@quiet='quiet'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r0}}]}) 10:42:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x7) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@phonet, &(0x7f0000000000)=0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) [ 1268.513455] hfs: unable to parse mount options [ 1268.565677] device veth1187 entered promiscuous mode 10:42:35 executing program 0: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="07ff88e0f42882b23f92f0b50e36956de8426c42058614e4744133e0e64f7ea9d16085a5712e198e644a7df7a967b6e755b605a325d590dac18ffb0b8e9771a459f364779efd03bccf99d71b310f122af46e2f69b0ff869c06000000001b4abd8373ccb41b590951015ce9e86c3a4f4ec54ba74abf5e6bc48ff4b7ef15472222373653f530162df8555283d557f6c7fa4dec2ff559904e772d188bbae0caf2c750a382314d39663bd9b38dcf514410"]) 10:42:35 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x40a, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1268.586376] device veth1187 left promiscuous mode 10:42:35 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000500)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000000)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000540), 0x4) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r7, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KIOCSOUND(r7, 0x4b2f, 0x3) socket$kcm(0x29, 0x5, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000b1000010800"/20, @ANYRES32=r6, @ANYBLOB="947b0933b2cf99d3"], 0x20}}, 0x0) [ 1268.663263] hfs: unable to parse mount options 10:42:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000280)={0x3, r0, 0x1}) close(r2) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000180)={@empty, 0x0}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=@newtclass={0x468, 0x28, 0x2, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x9, 0xfff3}, {0x4, 0xc}, {0xb, 0xb}}, [@tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x420, 0x2, [@TCA_CBQ_LSSOPT={0x18, 0x1, {0x3d, 0x3, 0x1b, 0x9, 0xc6ee, 0x4346, 0x8a, 0x7}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x3ff, 0x7, 0x2, 0x9, 0x3a, 0x330d, 0xfffff001, 0x5821, 0x200, 0x5, 0x9, 0x6, 0x7, 0x3, 0x4, 0x5, 0x4, 0x3f, 0x8, 0x1, 0x7, 0x80000001, 0x8, 0x4, 0x3ff, 0x7ff, 0x8, 0x1, 0x1, 0x1f, 0x2, 0x8001, 0x7ff, 0x2, 0x9, 0x7, 0x60000000, 0x0, 0x3, 0x0, 0xfffff575, 0xfffffc00, 0x603c, 0x4, 0xfffffffd, 0x8, 0xf3f, 0x5, 0x355, 0x4, 0xfffffffc, 0x6, 0x8001, 0x10000, 0x1, 0x0, 0xb33, 0x1f, 0x4e177a32, 0x0, 0x80d9, 0x6, 0x1, 0x1, 0x9, 0x40, 0xd1, 0x7, 0x3, 0xef5f, 0x400, 0x5, 0x80000001, 0x100, 0x6dc6, 0x8, 0x10000, 0x8001, 0x6624, 0x0, 0x2, 0x80, 0xff, 0x1, 0x200, 0x7f, 0x20, 0x4, 0x1, 0x6, 0x2, 0xa7, 0xffffffdc, 0x1000, 0x8001, 0x3, 0x0, 0x3, 0xfffffffa, 0x8, 0x1, 0x92e, 0x9, 0xc7, 0x1, 0x6, 0x9, 0x2, 0x1, 0x4, 0x1, 0x0, 0x400, 0x8, 0x6, 0x1000, 0x43e, 0x288, 0xc9f2, 0x8001, 0x2, 0x7f, 0xc56b, 0x0, 0x0, 0xfff, 0x80000000, 0x9, 0x3, 0x5, 0x9, 0x100, 0x4, 0x2, 0x7ff, 0x800, 0x2, 0x80000000, 0x100, 0x1, 0x4a2, 0x8001, 0x1, 0x0, 0x7, 0x100, 0x7, 0x10001, 0x7fffffff, 0x80, 0x5, 0x40, 0x8, 0x6, 0x3, 0x2, 0xfffffffe, 0xfffffffc, 0x0, 0x4d, 0x0, 0x8001, 0x80, 0x7f, 0x7, 0x80000000, 0x20, 0xffffffa6, 0x1, 0x1, 0x6, 0x7f, 0x8, 0x101, 0x101, 0x0, 0x6, 0x7fff, 0xfffffffb, 0x8001, 0x3d68, 0xedd, 0x9, 0x2, 0x2, 0xa2, 0x3, 0xff, 0x9, 0x80000001, 0x100, 0x3, 0x0, 0x2, 0x4, 0x401, 0x2, 0x7, 0x60, 0x101, 0x471a0f59, 0x1, 0x41, 0xba, 0x6, 0x0, 0x3, 0xff, 0x4, 0x6fe, 0x10000, 0x7, 0x8, 0x8, 0x0, 0xfe, 0x9, 0x7, 0x8b, 0x2, 0xbcc, 0xa2, 0x9, 0x9, 0x401, 0x9, 0x7, 0x2, 0x80, 0x0, 0xab, 0x4, 0x5, 0x9, 0x7ff, 0x7, 0x5, 0x9, 0x6, 0x3, 0x3, 0x7f, 0x8f15, 0x2, 0x1, 0x1, 0xfff, 0x6, 0x0, 0x49a8, 0x0, 0x100, 0xfff, 0x8f, 0x0, 0x5]}]}}, @TCA_RATE={0x6, 0x5, {0x7, 0xed}}, @TCA_RATE={0x6, 0x5, {0x6, 0x74}}, @tclass_kind_options=@c_prio={0x9, 0x1, 'prio\x00'}]}, 0x468}, 0x1, 0x0, 0x0, 0x40000}, 0x10) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r8, @ANYBLOB="1600000023000000"], 0x20}}, 0x0) 10:42:35 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xb000000) [ 1268.730746] hfs: unable to parse mount options 10:42:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) 10:42:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000001c0)={{0x32, @empty, 0x0, 0x0, 'none\x00'}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7b2d3f17}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[], 0xffffffa8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@local, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x48a000, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x40800) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, 0x0, 0x0) listen(r2, 0x0) r3 = getpid() fstat(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r6, 0x0) setsockopt$inet_dccp_buf(r6, 0x21, 0xc7, &(0x7f0000000400)="3eb59603a8ddf4e460951159d2f5b656f8637918e67a37a3b7087505903267c93e1abf6205e8b8a66f3065c9649ed94cfbf133582db6e990b249202dc086018691ba4e42890eed9504bb86ef98263825d24e153f239b20e475d4541987b377a9b21b96ef86ccd66edd83eb7df57c929c6acda0fa8659c8ca7915a4b60ebe932e369e60b4af9f8a62b786b55480d4ecab7df6e384571364eb41b34749c0015284941c42d6ae1bd83038faeb78ca9cbc56204e2f5f418ee1faf6e4560145b219bfa272c84b11d23185a619e16eb49ee8113e7a2005d2c93f7953ec570ff61701cdf1ca6dc2d4873f3b02e85c315edf8ffbcc10f0", 0xf3) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="020000000a00020000040001fffffff606000500020000"], 0x3}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000e00)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)}], 0x2, 0x0, 0x0, 0x4048100}, {0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="199c342de2cfb2475fa43049d2c7402e95bd204d1fa23775e6cd1e06d7d0880bd8f3e65715a176a0359b008f60fff0d9866ffb777d95afbc9462fcafdc0726dfc8c5d7387b1b64263100911c1abd340ec31373437f1d8a09", 0x58}], 0x1, &(0x7f0000000500)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4}}}], 0x40, 0x4004}, {&(0x7f0000000580)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000740)}, {&(0x7f00000007c0)="396f9b8f20161051958bcfc059abda636d7dc628cd78cae1b0bf6b342a735ebe272908a097a659e8aa2b76526f8724c4ab124dc90b42a2e939e1099f7dbd048d464453e77cccffb17ee5582c4b04185eb2991bb800cddd59deec6589b4ea6bf7c0568c77310769b27a9d68832f3a42259994b11d0354", 0x76}], 0x3, &(0x7f00000010c0)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRESHEX=r5, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x3a}, {&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x4, 0xc811) syz_mount_image$hfs(&(0x7f00000002c0)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x80, &(0x7f0000000240)={[{@type={'type', 0x3d, "7bc005dd"}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type', 0x3d, 'type'}}, {@hash='hash'}, {@subj_role={'subj_role', 0x3d, 'type'}}, {@subj_user={'subj_user', 0x3d, 'none\x00'}}, {@fowner_gt={'fowner>', r4}}]}) [ 1268.910843] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 10:42:35 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x2000}}, 0x20}, 0x1, 0x0, 0x0, 0x2002c8a0}, 0x0) [ 1268.981357] hfs: unable to parse mount options 10:42:36 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x425, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1269.390638] nla_parse: 4 callbacks suppressed [ 1269.390645] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1269.444760] device veth1189 entered promiscuous mode [ 1269.467778] device veth1189 left promiscuous mode 10:42:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000280)={0x3, r0, 0x1}) close(r2) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000180)={@empty, 0x0}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=@newtclass={0x468, 0x28, 0x2, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x9, 0xfff3}, {0x4, 0xc}, {0xb, 0xb}}, [@tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x420, 0x2, [@TCA_CBQ_LSSOPT={0x18, 0x1, {0x3d, 0x3, 0x1b, 0x9, 0xc6ee, 0x4346, 0x8a, 0x7}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x3ff, 0x7, 0x2, 0x9, 0x3a, 0x330d, 0xfffff001, 0x5821, 0x200, 0x5, 0x9, 0x6, 0x7, 0x3, 0x4, 0x5, 0x4, 0x3f, 0x8, 0x1, 0x7, 0x80000001, 0x8, 0x4, 0x3ff, 0x7ff, 0x8, 0x1, 0x1, 0x1f, 0x2, 0x8001, 0x7ff, 0x2, 0x9, 0x7, 0x60000000, 0x0, 0x3, 0x0, 0xfffff575, 0xfffffc00, 0x603c, 0x4, 0xfffffffd, 0x8, 0xf3f, 0x5, 0x355, 0x4, 0xfffffffc, 0x6, 0x8001, 0x10000, 0x1, 0x0, 0xb33, 0x1f, 0x4e177a32, 0x0, 0x80d9, 0x6, 0x1, 0x1, 0x9, 0x40, 0xd1, 0x7, 0x3, 0xef5f, 0x400, 0x5, 0x80000001, 0x100, 0x6dc6, 0x8, 0x10000, 0x8001, 0x6624, 0x0, 0x2, 0x80, 0xff, 0x1, 0x200, 0x7f, 0x20, 0x4, 0x1, 0x6, 0x2, 0xa7, 0xffffffdc, 0x1000, 0x8001, 0x3, 0x0, 0x3, 0xfffffffa, 0x8, 0x1, 0x92e, 0x9, 0xc7, 0x1, 0x6, 0x9, 0x2, 0x1, 0x4, 0x1, 0x0, 0x400, 0x8, 0x6, 0x1000, 0x43e, 0x288, 0xc9f2, 0x8001, 0x2, 0x7f, 0xc56b, 0x0, 0x0, 0xfff, 0x80000000, 0x9, 0x3, 0x5, 0x9, 0x100, 0x4, 0x2, 0x7ff, 0x800, 0x2, 0x80000000, 0x100, 0x1, 0x4a2, 0x8001, 0x1, 0x0, 0x7, 0x100, 0x7, 0x10001, 0x7fffffff, 0x80, 0x5, 0x40, 0x8, 0x6, 0x3, 0x2, 0xfffffffe, 0xfffffffc, 0x0, 0x4d, 0x0, 0x8001, 0x80, 0x7f, 0x7, 0x80000000, 0x20, 0xffffffa6, 0x1, 0x1, 0x6, 0x7f, 0x8, 0x101, 0x101, 0x0, 0x6, 0x7fff, 0xfffffffb, 0x8001, 0x3d68, 0xedd, 0x9, 0x2, 0x2, 0xa2, 0x3, 0xff, 0x9, 0x80000001, 0x100, 0x3, 0x0, 0x2, 0x4, 0x401, 0x2, 0x7, 0x60, 0x101, 0x471a0f59, 0x1, 0x41, 0xba, 0x6, 0x0, 0x3, 0xff, 0x4, 0x6fe, 0x10000, 0x7, 0x8, 0x8, 0x0, 0xfe, 0x9, 0x7, 0x8b, 0x2, 0xbcc, 0xa2, 0x9, 0x9, 0x401, 0x9, 0x7, 0x2, 0x80, 0x0, 0xab, 0x4, 0x5, 0x9, 0x7ff, 0x7, 0x5, 0x9, 0x6, 0x3, 0x3, 0x7f, 0x8f15, 0x2, 0x1, 0x1, 0xfff, 0x6, 0x0, 0x49a8, 0x0, 0x100, 0xfff, 0x8f, 0x0, 0x5]}]}}, @TCA_RATE={0x6, 0x5, {0x7, 0xed}}, @TCA_RATE={0x6, 0x5, {0x6, 0x74}}, @tclass_kind_options=@c_prio={0x9, 0x1, 'prio\x00'}]}, 0x468}, 0x1, 0x0, 0x0, 0x40000}, 0x10) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r8, @ANYBLOB="1600000023000000"], 0x20}}, 0x0) [ 1269.704336] IPVS: set_ctl: invalid protocol: 50 0.0.0.0:0 10:42:36 executing program 0: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) chroot(&(0x7f0000000100)='./file0\x00') r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000000c0)) 10:42:36 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xc000000) [ 1269.791421] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0x0, 0xfffffffffffffff8, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}}, 0x20}}, 0x0) 10:42:36 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 10:42:36 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x140, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1269.859217] hfs: can't find a HFS filesystem on dev loop0 10:42:36 executing program 0: ioctl$SIOCX25GCALLUSERDATA(0xffffffffffffffff, 0x89e4, &(0x7f0000000140)={0x72, "a5f6eadf9b857af1f048b5bda69fcca21a10bed5006af38d41cbeaa71fa4e80ef4259685635b778bd703377a765c5e05dbb39658ed3d3ad4c0d3500bb03fe9fb5a9adcde87c807b10f5bf154c3dd8180c3338bc092029dd6eed7568a01f9e1fec7cfacaea5660aebc500636d5c564e9615a7494303e8f57b752b5ce3ca112535"}) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@type={'type', 0x3d, "420fb942"}}]}) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth0_to_batadv\x00', {0x2, 0x4e24, @loopback}}) restart_syscall() 10:42:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 10:42:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) ioctl$KDFONTOP_COPY(r4, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = getpid() r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r7, 0x0) sendmsg$IPSET_CMD_ADD(r7, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x60, 0x9, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x60}}, 0x40) syz_open_procfs(r6, &(0x7f0000000500)='cgroup\x00') sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r5, @ANYBLOB="0300ffeaa04bff0000c9696898e3e710eaede24b47bd21b5025d4dd574c73977a8b4034b6208cc4d32c731de1cdb"], 0x20}}, 0x0) 10:42:36 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xe000000) [ 1270.030227] hfs: can't find a HFS filesystem on dev loop0 [ 1270.039716] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x13) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x3}}, 0x20}}, 0x0) [ 1270.150663] device veth1191 entered promiscuous mode 10:42:36 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x370, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1270.189116] device veth1191 left promiscuous mode 10:42:37 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) bind(r0, &(0x7f0000000240)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @default]}, 0x80) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001000010800b7d3ab1d3d17580747bf93db363f7ad00000001200000100000000", @ANYRES32=r4, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x800) connect$tipc(r5, &(0x7f0000000200)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x200, 0x0) write$dsp(0xffffffffffffffff, &(0x7f00000002c0)="3fac4e825c522670c77522dd46576d7d5161d71130528b2bc866e91cafd7b02cce177f07bb7183d68daeef5c516f685c67dfa21f1d846523f293452233ce4c4e53415a0de9c4bacedc42b5983377e23ac7046715289818f1dd2b5561acae0b392c0efc9c", 0x64) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x3}, 0x8) [ 1270.304355] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1270.386288] device veth1191 entered promiscuous mode [ 1270.402051] device veth1191 left promiscuous mode 10:42:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) ioctl$KDFONTOP_COPY(r4, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = getpid() r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r7, 0x0) sendmsg$IPSET_CMD_ADD(r7, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x60, 0x9, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x60}}, 0x40) syz_open_procfs(r6, &(0x7f0000000500)='cgroup\x00') sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r5, @ANYBLOB="0300ffeaa04bff0000c9696898e3e710eaede24b47bd21b5025d4dd574c73977a8b4034b6208cc4d32c731de1cdb"], 0x20}}, 0x0) 10:42:37 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xf000000) 10:42:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x8a895793}, 0x0) 10:42:37 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x40a, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:37 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)="f22cbcfe58946672ef9b9d4df1a8e0211efcadb3be44b7268ed0b8dd5f9a484b57fb07dddeac45b0efbc060434e8bd812c460af0e41587", 0x37}, {&(0x7f0000000200)="96b97399fd3ef8a27ac192c4972728881246e34e8a7abd43f9108d265a7bd67f28de5a78df7935244aba00d2857e42020d5e880f0c9786518e1c331bbc714133e4ef91", 0x43}], 0x2, 0x3f) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ttyprintk\x00', 0x103000, 0x0) ioctl$TIOCCONS(r1, 0x541d) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x80010, r5, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000000)={0x3, 'wg0\x00', {}, 0xbf}) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x3}}, 0x20}}, 0x0) [ 1270.656086] xt_check_table_hooks: 2 callbacks suppressed [ 1270.656096] x_tables: duplicate underflow at hook 2 [ 1270.684276] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1270.786104] device veth1191 entered promiscuous mode [ 1270.815290] device veth1191 left promiscuous mode 10:42:37 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x425, 0x468, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KDFONTOP_COPY(r4, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = getpid() r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r7, 0x0) sendmsg$IPSET_CMD_ADD(r7, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x60, 0x9, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x60}}, 0x40) syz_open_procfs(r6, &(0x7f0000000500)='cgroup\x00') sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r5, @ANYBLOB="0300ffeaa04bff0000c9696898e3e710eaede24b47bd21b5025d4dd574c73977a8b4034b6208cc4d32c731de1cdb"], 0x20}}, 0x0) 10:42:37 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0xfffffff) [ 1270.922088] x_tables: duplicate underflow at hook 2 [ 1270.953905] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:37 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e2, 0x5, 0xc1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="20090000000001080000000000000000000000006ba509d00501db7db33601a5009b80d90f0debcc4c81c44d15821c7c6fa85e3857406f533511a5905583000a3b1ea96e5925b0d877350e52ec7c277cc2087af40b1b626210e9876b", @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r2, &(0x7f0000000000)) [ 1271.100437] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18889 comm=syz-executor.3 10:42:37 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x140, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1271.197228] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18997 comm=syz-executor.3 10:42:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x9357898a}, 0x0) 10:42:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KDFONTOP_COPY(r3, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = getpid() r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r5, 0x0) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x60, 0x9, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x60}}, 0x40) syz_open_procfs(r4, &(0x7f0000000500)='cgroup\x00') [ 1271.295871] x_tables: duplicate underflow at hook 2 [ 1271.357104] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:38 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x10000000) 10:42:38 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x20) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x3}}, 0x20}}, 0x0) 10:42:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KDFONTOP_COPY(r3, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getpid() r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) sendmsg$IPSET_CMD_ADD(r4, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x60, 0x9, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x60}}, 0x40) [ 1271.551830] device veth1191 entered promiscuous mode [ 1271.597301] device veth1191 left promiscuous mode 10:42:38 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x370, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:38 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000280)={r4, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r4}}, 0x20}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@deltfilter={0x4c, 0x2d, 0x400, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x4, 0xfff1}, {0xffe0, 0x7}, {0x9}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0xc, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0x13, 0x6}}]}}, @TCA_RATE={0x6, 0x5, {0x6}}, @TCA_CHAIN={0x8, 0xb, 0x9}]}, 0x4c}}, 0x4048004) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x3}}, 0x20}}, 0x0) [ 1271.750542] x_tables: duplicate underflow at hook 2 10:42:38 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x3f000000) [ 1271.766293] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1271.876759] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 10:42:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 10:42:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) ioctl$KDFONTOP_COPY(r3, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getpid() r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) [ 1272.016614] device veth1445 entered promiscuous mode [ 1272.038493] device veth1445 left promiscuous mode [ 1272.188477] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1272.256672] device veth1193 entered promiscuous mode 10:42:39 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x40a, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KDFONTOP_COPY(r3, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getpid() open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) [ 1272.299105] device veth1193 left promiscuous mode [ 1272.342004] x_tables: duplicate underflow at hook 2 10:42:39 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x40000000) [ 1272.597065] device veth1193 entered promiscuous mode [ 1272.605516] device veth1193 left promiscuous mode 10:42:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KDFONTOP_COPY(r3, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getpid() 10:42:39 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x425, 0x4, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1272.730084] x_tables: duplicate underflow at hook 2 10:42:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xb2000000}, 0x0) 10:42:39 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000180)) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r4, 0x4140, 0x0) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x3}}, 0x20}}, 0x0) 10:42:39 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x60000000) 10:42:39 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x2, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r3, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KDFONTOP_COPY(r3, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) [ 1272.972863] x_tables: duplicate underflow at hook 2 10:42:39 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x7c, 0x2, 0x7, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x6}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x38000000}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x5}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x10001}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x40050) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}}, 0x20}}, 0x0) [ 1273.172367] device veth1193 entered promiscuous mode 10:42:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) [ 1273.229887] device veth1193 left promiscuous mode 10:42:40 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x3, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:40 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x4, 0x6, 0x6, 0x4, 'syz0\x00', 0x4}) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}}, 0x20}}, 0x0) 10:42:40 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x65580000) [ 1273.431197] x_tables: duplicate underflow at hook 2 [ 1273.466870] device veth1193 entered promiscuous mode [ 1273.475876] device veth1193 left promiscuous mode 10:42:40 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) 10:42:40 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x5, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:40 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001000010800000000000000000000000046df", @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) 10:42:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xbb0e0000}, 0x0) [ 1273.697716] x_tables: duplicate underflow at hook 2 10:42:40 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x81000000) 10:42:40 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r3, @ANYBLOB='@\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 10:42:40 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x6, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:40 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) [ 1273.950420] x_tables: duplicate underflow at hook 2 10:42:40 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) 10:42:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) 10:42:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) 10:42:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) 10:42:41 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000001c0)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRES16=0x0, @ANYPTR64, @ANYRESHEX, @ANYPTR=&(0x7f0000000140)=ANY=[], @ANYPTR], 0x5}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000500)={r3}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000280)={r3, 0x1}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000180)={r3, 0x5, &(0x7f0000000000)=[0x3ff, 0x6, 0x2, 0x3, 0x5], &(0x7f00000000c0), 0x51, 0x8, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0xcdd6, 0x59f6084a, 0x1, 0x80, 0x20, 0x2], &(0x7f0000000140)=[0x9, 0x7, 0x6, 0x1f, 0x1f, 0x3b8ea641, 0x173, 0x6, 0x2, 0x1]}) 10:42:41 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x54, 0x2, 0x8, 0x5, 0x0, 0x0, {0xc, 0x0, 0x7}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x10001}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x120}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1f}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xf8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x92ac}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4001}, 0x4001000) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r4, @ANYBLOB="ffffffffbf1d8f79f554de330ba8dcb3b0367cb6b03559ec47609209e0cd99676971b41c37f29091eed0cc8022784fcf0299a74619978ea1abd23aa8333fb9430b8368614be3de40aaf051e6b0e380ef7f40925d90104531681a719f6cf7e4c66bba507e6cb86f5d738001931a844a89fc443da78deb1e2522ef7b3d04da4f9d51e53bab02d58cc5f30c475b4e598c769bc7ada852aa070f65b6129a96c356efa125de62a2e5769a01b721e8da7c6d3cf645fe03bf86c6d9b61b20df765fce4235ff7d2091d96421d1967e05fce99c9e23aa120e6c688873e55afc7bd625a8eecae1ce65b830443908a83cb3ec21"], 0x20}}, 0x0) [ 1274.894803] nla_parse: 5 callbacks suppressed [ 1274.894812] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) [ 1274.977906] hfs: can't find a HFS filesystem on dev loop0 [ 1275.009703] device veth1193 entered promiscuous mode [ 1275.043590] device team0 entered promiscuous mode [ 1275.043602] device team_slave_0 entered promiscuous mode [ 1275.043804] device team_slave_1 entered promiscuous mode 10:42:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 10:42:41 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x880335b4) 10:42:41 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x7, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:41 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200140, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000000c0)=0xf, 0x1) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100)=0x3bd1, &(0x7f0000000140)=0x2) 10:42:41 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r3, 0x0) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f00000005c0)={0x8, "2d4477cbb4a4e314f51bb44920e2fa8b3c317c6e26842792b2650c6b0849ee2e", 0x5, 0x8, 0x0, 0xffffff43, 0x0, 0x4, 0x9, 0xfffffffd}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r4, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="6cdfaab472ac96191675eb1cc8d300c90010ca864b58cd42e46adc51c5c71a3281f819a4d724eab248bd0206adbe4243c6c257ffaa45778024318b197d6be260f0df26e774fb3506c9c321529f23f123f67f27cc6e581aa590613bdf80368f8658dc6e5999c760b967544e7f06ca4e4b99f5b5a8aae969b1ad868f14cf82ef6f26e1ff8093a8e9d66f03ba2d28289599be595226200dd73cc606cf0f6b1cfb93eea21a48d75bd86734ce029bf820242f3f2bd7a66a63ee4dfc9d6f8f7befb0579d0ff3e62658322b58b9863f3207bf37f46a4b4582e659482854345335b3f7ea2d7624d61a5279a30aacc8d2743e01a35e93fbb7f4a6f7ee401d739090d6695597366404e78deb85518aade43892c665ce677ab9fe64fbcab9b205b0c5acbe6ec7a61dcf3f53b62ca3cfedeb03e980e5b4be68f7465e4a4c6c63589ef855e8ea038960fb67fa028c30ccafa3ae2a32603a51df11cc7eafb014708711d0274f9ca40fd9cc0bc68470703548f0586e17ec137236152924dc47162ec0a1b1dc361a2cd5a82e4bb59153ef77423ceb48447b70913a13a68092f4a5cf010971b0f743d1e3a85ac89cbc21457a66dcd38110981e6f800ceb07db8869ba1d44918089e0a56e8ef5911e936016a8ee4fcbd8b9f781b3eb470e38e0f0e9eb44b9c9f0f44c628f09adbf3c275614d9e9c47ef3fbd7d3764f71155f62bba4f4d77eab01cc411fda96492125f84b63d95d65f64166a8060ac29965d5be16400ca917ee421884c9dbfc02c6bd6243377421dee4b90dceed627b762ef6065683cbb77fc7d6ff3f781ef50acec3d167460355d5d6da0181631c6a4c150426b6fe144c80d2363d9f40e40652be6398c526ff8c50e4d0f04fad6f962525d80969db4d870eb872a099e52d160d3913d7240518356e5ff41ffddc84d55273c236b6857b90c0a8cda8355a9679ae0edc875bb8c721a02d63d3eec3f8af16b2e3424c83805ae613630869748dc91ad44bc042dcb739240fe0cc22d65b1739dffad040e7a5bcbdd1bb47e0d981337feff80f4ff3a4196ce15e89b3a6b5b52aba9778ee5ce4e955e07a87f77aedbf27cceec7978aa790d09fcf300c6df78001ac1073f4e8d268d955a69803b8f9f1e9f2970117d0c64cdc1fad790cef14207e0721058b976cc85792dba33b44123895c9a89911024c9d2bbec9795dd373d5eab1c6b11285b994e5ab3f2f99b7c82151da01897840abf9851c989c0c07ba9e04b6b92d51772caf52fda33fb7f5ca3ed678db05ac39c8398af8385855574d255d6c846044875db62ec348df23863c803d4c764f6682341e3eeadb2ee3873aa7462cbd8c9bcc40d8f2c77c0078fd9cc4bbdd3753b382cc71b2552a4f1bdcaaa2f33fb093d7719d58eb0045faf9f87e8962ee704ebfb829e1a7051636b7721394daff82edb41ef5ae8b1dd8a25a"}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r6, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x30, r6, 0x2, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0xfffffffe, 0x7, 0x4, 0x8}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20044040}, 0x8000004) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r7, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r8, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) r9 = dup(r1) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="200000001000010800"/20, @ANYRES32=r10, @ANYBLOB="9ff444d03aaaba5ab2d8c3ac282018bd052056ca01b487e53c0cd90a2fbd86b39f186369196095eefde0da20567a04f41eba942dd1228a91fd65a708f5f93c9de64f6fc1581dc1497b7292de2584f77eb2d76283c8b29c672fb175b943c3b8d8de87b631ffa9e8ffca9de72ad9ac85d1d677"], 0x20}}, 0x0) [ 1275.204998] hfs: can't find a HFS filesystem on dev loop0 [ 1275.216907] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) [ 1275.280285] hfs: can't find a HFS filesystem on dev loop0 10:42:42 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x18) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000200)={0x1, 0x0, 0x100, 0x4, {0x4, 0x6811, 0xffffffff, 0x7fffffff}}) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r1, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x83bc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@type={'type', 0x3d, "420fb942"}}]}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000240)=""/43, 0x2b) [ 1275.343795] device veth1193 entered promiscuous mode [ 1275.372607] device veth1193 left promiscuous mode 10:42:42 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x12, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:42 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000180)=0x11, 0x4) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}}, 0x20}}, 0x0) 10:42:42 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x88a8ffff) 10:42:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) [ 1275.480995] hfs: can't find a HFS filesystem on dev loop0 [ 1275.502432] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) setuid(r1) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0\x00', r1, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x3, &(0x7f0000000200)=[{&(0x7f0000000080)="3bcc9a6c85d4f1a530f3c9a37a9804550db04e8a3d30951773c00392ad11105ce49d2053c9fe8983a35ff2f9d7bfb839d162f033194b7388f7e48c9a7405ae267b5a4d08ed9eac5ca4ae9a06676850083e9b0ef747e72190dc100236e63dc686551965d2bba1da692d32571687510a2efc6d58e9cd7030629c866dde1770ab51ecf9426bdbe6707f5cba35ff20254f8471bf9c6f91616bdf11414844fde30aad156a82439b2a1cc05536b782e66bbe6b17ba84fb4e64b554f08d72a89441c404865593b8a7b2", 0xc6, 0x7ebdd969}, {&(0x7f0000000180)="39f6bda3615f7b21106cfd5dfda16e20dd404f8624400589dfd8925c", 0x1c, 0xc7e}, {&(0x7f00000001c0)="c6343f622d75611c261761d2e2490f04c9351a", 0x13, 0xfffffffffffffffd}], 0x200490, &(0x7f00000003c0)={[{@huge_within_size={'huge=within_size', 0x3d, '{'}}, {@gid={'gid', 0x3d, r2}}], [{@smackfsroot={'smackfsroot', 0x3d, '}.'}}, {@fsmagic={'fsmagic', 0x3d, 0x100000000000000}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) 10:42:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002000000010000000000", @ANYRES32=0x0, @ANYBLOB="656c67b30c5f8324e858f9fcee56ae99a957eb99fbe1458821edb7b0c5402dc38d07275b3bc18afcdeab68bcaac6dcf566aaa265b4498a8d4374cfab31e2b197589617ec3fb2413961b5b0bcf24d0af2b7d6cf03ebb242df128faf2f648187fc21193ea3f1d403b8c0cd833c9e4a0ce9fb2c37c659c3846da11aa4e07cb01a5f03c5edab0d78f5aa30e80604a8e302e4872bd4caf6712e32099802a936f02db3afd0d92ec1c30a462b4b547bc8d1f88ffe1c766f754356de0c267f5ce8f2a3"], 0x48}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @link_local}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x7a00, r3}}, 0x20}, 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) [ 1275.658761] tmpfs: Bad value 'within_size={' for mount option 'huge' [ 1275.707421] 8021q: adding VLAN 0 to HW filter on device bond0 10:42:42 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x37, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) 10:42:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x11, 0x0, 0x2000200, &(0x7f00000000c0)="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"}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) link(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='./file0\x00') write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/1250], 0x4e2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) syncfs(r2) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10400, &(0x7f0000000000)=ANY=[@ANYBLOB="ed5796d27de1127d83e23ad10d764961a0db00"]) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f00000000c0)={{0x2, 0x0, @identifier="263fd09df98eae4ab49d72c7e98da239"}}) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, r3) r4 = add_key(&(0x7f0000000a40)='dns_resolver\x00', &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$revoke(0x3, r4) 10:42:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) [ 1275.775585] xt_check_table_hooks: 2 callbacks suppressed [ 1275.775593] x_tables: duplicate underflow at hook 2 10:42:42 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007f7ffffff4007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x2c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_CHAIN={0x8}]}, 0x2c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x9effffff) 10:42:42 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"/267, @ANYRES32=r3, @ANYBLOB="0300000000000000"], 0x20}}, 0x0) [ 1275.834713] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1275.835058] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 10:42:42 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x3700, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1275.950591] device veth1195 entered promiscuous mode [ 1275.952406] device veth1195 left promiscuous mode [ 1275.977980] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8208 sclass=netlink_route_socket pig=20329 comm=syz-executor.3 10:42:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x18, 0x9, 0x200, &(0x7f00000000c0)="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"}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0xfffffff9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000a00)={0x3, 0x1, 0x1, 0x5, 0xde, &(0x7f0000000600)}) [ 1276.041152] x_tables: duplicate underflow at hook 2 [ 1276.094960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8208 sclass=netlink_route_socket pig=20345 comm=syz-executor.3 [ 1276.095636] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1276.129074] hfs: unable to parse mount options [ 1276.146839] device veth1195 entered promiscuous mode [ 1276.174503] device veth1195 left promiscuous mode 10:42:42 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@filter={'filter\x00', 0xe, 0x4, 0x538, 0x0, 0x0, 0x370, 0x370, 0x370, 0x468, 0x468, 0x468, 0x468, 0x468, 0x7fffffe, 0x0, {[{{@ipv6={@local, @mcast2, [], [], 'rose0\x00', 'bridge_slave_1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x0, 0x10000, 0x0, 0x0, 0xff, 0x7}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="5b111bd336fe00010400", [], [], 'rose0\x00'}, 0x0, 0x208, 0x230, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @dev, @loopback, @mcast1, @dev, @mcast2]}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'veth1_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"e2f6"}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) memfd_create(&(0x7f0000000100)='wlan1\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "86f216ddda69942e96f039cf605ff038"}, 0x11, 0x1) [ 1276.224634] ================================================================== [ 1276.224812] BUG: KASAN: global-out-of-bounds in fb_pad_aligned_buffer+0x137/0x150 [ 1276.224827] Read of size 1 at addr ffffffff87ad6eaa by task syz-executor.4/20374 [ 1276.224831] [ 1276.224847] CPU: 1 PID: 20374 Comm: syz-executor.4 Not tainted 4.19.109-syzkaller #0 [ 1276.224856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1276.224862] Call Trace: [ 1276.224880] dump_stack+0x188/0x20d [ 1276.224898] ? fb_pad_aligned_buffer+0x137/0x150 [ 1276.224918] print_address_description.cold+0x5/0x212 [ 1276.224934] ? fb_pad_aligned_buffer+0x137/0x150 [ 1276.224949] kasan_report.cold+0x88/0x2b9 [ 1276.224967] fb_pad_aligned_buffer+0x137/0x150 [ 1276.224990] bit_putcs+0xc21/0xe10 [ 1276.225014] ? __schedule+0x86e/0x1d80 [ 1276.225047] ? bit_cursor+0x1900/0x1900 [ 1276.225065] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1276.225084] ? fb_get_color_depth.part.0+0xc6/0x1f0 [ 1276.225104] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1276.225125] fbcon_putcs+0x434/0x4f0 [ 1276.225144] ? bit_cursor+0x1900/0x1900 [ 1276.225241] do_update_region+0x398/0x630 [ 1276.225266] ? con_get_trans_old+0x280/0x280 [ 1276.225288] ? fbcon_set_palette+0x4c6/0x5e0 [ 1276.225304] ? fbcon_redraw.isra.0+0x4c0/0x4c0 [ 1276.225325] redraw_screen+0x5e1/0x870 [ 1276.225343] ? con_flush_chars+0x90/0x90 [ 1276.225389] ? console_lock+0x25/0x80 [ 1276.225416] fbcon_do_set_font+0x727/0xa30 [ 1276.225439] ? fbcon_do_set_font+0xa30/0xa30 [ 1276.225453] fbcon_copy_font+0x125/0x190 [ 1276.225480] con_font_op+0x63f/0x1130 [ 1276.225500] ? con_write+0xe0/0xe0 [ 1276.225514] ? lock_downgrade+0x740/0x740 [ 1276.225543] ? __might_fault+0x192/0x1d0 [ 1276.225567] vt_ioctl+0x1615/0x2310 [ 1276.225587] ? complete_change_console+0x390/0x390 [ 1276.225602] ? avc_has_extended_perms+0x9c6/0x1030 [ 1276.225629] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1276.225648] ? complete_change_console+0x390/0x390 [ 1276.225690] tty_ioctl+0x7a1/0x1420 [ 1276.225708] ? tty_vhangup+0x30/0x30 [ 1276.225725] ? perf_trace_lock+0xeb/0x4c0 [ 1276.225746] ? SOFTIRQ_verbose+0x10/0x10 [ 1276.225774] ? tty_vhangup+0x30/0x30 [ 1276.225791] do_vfs_ioctl+0xcda/0x12e0 [ 1276.225808] ? selinux_file_ioctl+0x46c/0x5d0 [ 1276.225824] ? selinux_file_ioctl+0x125/0x5d0 [ 1276.225840] ? check_preemption_disabled+0x41/0x280 [ 1276.225855] ? ioctl_preallocate+0x200/0x200 [ 1276.225871] ? selinux_file_mprotect+0x600/0x600 [ 1276.225888] ? __fget+0x340/0x510 [ 1276.225908] ? iterate_fd+0x350/0x350 [ 1276.225932] ? security_file_ioctl+0x6c/0xb0 [ 1276.225950] ksys_ioctl+0x9b/0xc0 [ 1276.225967] __x64_sys_ioctl+0x6f/0xb0 [ 1276.225982] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1276.225999] do_syscall_64+0xf9/0x620 [ 1276.226017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1276.226029] RIP: 0033:0x45c799 [ 1276.226051] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1276.226059] RSP: 002b:00007fd33d7e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1276.226074] RAX: ffffffffffffffda RBX: 00007fd33d7ea6d4 RCX: 000000000045c799 [ 1276.226084] RDX: 0000000020000a00 RSI: 0000000000004b72 RDI: 0000000000000009 [ 1276.226094] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1276.226103] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1276.226112] R13: 000000000000036b R14: 00000000004c5d07 R15: 000000000076bf0c [ 1276.226133] [ 1276.226138] The buggy address belongs to the variable: [ 1276.226219] oid_index+0x6ea/0xa60 [ 1276.226224] [ 1276.226229] Memory state around the buggy address: [ 1276.226243] ffffffff87ad6d80: fa fa fa fa 00 00 00 fa fa fa fa fa 00 01 fa fa [ 1276.226254] ffffffff87ad6e00: fa fa fa fa 00 00 00 00 fa fa fa fa 04 fa fa fa [ 1276.226265] >ffffffff87ad6e80: fa fa fa fa 00 01 fa fa fa fa fa fa 04 fa fa fa [ 1276.226271] ^ [ 1276.226283] ffffffff87ad6f00: fa fa fa fa 04 fa fa fa fa fa fa fa 07 fa fa fa [ 1276.226294] ffffffff87ad6f80: fa fa fa fa 04 fa fa fa fa fa fa fa 05 fa fa fa [ 1276.226300] ================================================================== [ 1276.226305] Disabling lock debugging due to kernel taint [ 1276.240521] Kernel panic - not syncing: panic_on_warn set ... [ 1276.240521] [ 1276.240543] CPU: 1 PID: 20374 Comm: syz-executor.4 Tainted: G B 4.19.109-syzkaller #0 [ 1276.240552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1276.240557] Call Trace: [ 1276.240581] dump_stack+0x188/0x20d [ 1276.240660] panic+0x26a/0x50e [ 1276.240678] ? __warn_printk+0xf3/0xf3 [ 1276.240698] ? preempt_schedule_common+0x4a/0xc0 [ 1276.240715] ? fb_pad_aligned_buffer+0x137/0x150 [ 1276.240731] ? ___preempt_schedule+0x16/0x18 [ 1276.240746] ? trace_hardirqs_on+0x55/0x210 [ 1276.240762] ? fb_pad_aligned_buffer+0x137/0x150 [ 1276.240778] kasan_end_report+0x43/0x49 [ 1276.240793] kasan_report.cold+0xa4/0x2b9 [ 1276.240809] fb_pad_aligned_buffer+0x137/0x150 [ 1276.240830] bit_putcs+0xc21/0xe10 [ 1276.240849] ? __schedule+0x86e/0x1d80 [ 1276.240871] ? bit_cursor+0x1900/0x1900 [ 1276.240886] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1276.240901] ? fb_get_color_depth.part.0+0xc6/0x1f0 [ 1276.240915] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1276.240932] fbcon_putcs+0x434/0x4f0 [ 1276.240948] ? bit_cursor+0x1900/0x1900 [ 1276.240964] do_update_region+0x398/0x630 [ 1276.240983] ? con_get_trans_old+0x280/0x280 [ 1276.241000] ? fbcon_set_palette+0x4c6/0x5e0 [ 1276.241021] ? fbcon_redraw.isra.0+0x4c0/0x4c0 [ 1276.241037] redraw_screen+0x5e1/0x870 [ 1276.241053] ? con_flush_chars+0x90/0x90 [ 1276.241069] ? console_lock+0x25/0x80 [ 1276.241090] fbcon_do_set_font+0x727/0xa30 [ 1276.241110] ? fbcon_do_set_font+0xa30/0xa30 [ 1276.241125] fbcon_copy_font+0x125/0x190 [ 1276.241141] con_font_op+0x63f/0x1130 [ 1276.241159] ? con_write+0xe0/0xe0 [ 1276.241172] ? lock_downgrade+0x740/0x740 [ 1276.241194] ? __might_fault+0x192/0x1d0 [ 1276.241212] vt_ioctl+0x1615/0x2310 [ 1276.241229] ? complete_change_console+0x390/0x390 [ 1276.241242] ? avc_has_extended_perms+0x9c6/0x1030 [ 1276.241263] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1276.241279] ? complete_change_console+0x390/0x390 [ 1276.241294] tty_ioctl+0x7a1/0x1420 [ 1276.241309] ? tty_vhangup+0x30/0x30 [ 1276.241324] ? perf_trace_lock+0xeb/0x4c0 [ 1276.241340] ? SOFTIRQ_verbose+0x10/0x10 [ 1276.241361] ? tty_vhangup+0x30/0x30 [ 1276.241377] do_vfs_ioctl+0xcda/0x12e0 [ 1276.241392] ? selinux_file_ioctl+0x46c/0x5d0 [ 1276.241408] ? selinux_file_ioctl+0x125/0x5d0 [ 1276.241425] ? check_preemption_disabled+0x41/0x280 [ 1276.241439] ? ioctl_preallocate+0x200/0x200 [ 1276.241456] ? selinux_file_mprotect+0x600/0x600 [ 1276.241472] ? __fget+0x340/0x510 [ 1276.241488] ? iterate_fd+0x350/0x350 [ 1276.241508] ? security_file_ioctl+0x6c/0xb0 [ 1276.241527] ksys_ioctl+0x9b/0xc0 [ 1276.241542] __x64_sys_ioctl+0x6f/0xb0 [ 1276.241556] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1276.241572] do_syscall_64+0xf9/0x620 [ 1276.241588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1276.241599] RIP: 0033:0x45c799 [ 1276.241614] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1276.241621] RSP: 002b:00007fd33d7e9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1276.241636] RAX: ffffffffffffffda RBX: 00007fd33d7ea6d4 RCX: 000000000045c799 [ 1276.241644] RDX: 0000000020000a00 RSI: 0000000000004b72 RDI: 0000000000000009 [ 1276.241653] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1276.241661] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1276.241670] R13: 000000000000036b R14: 00000000004c5d07 R15: 000000000076bf0c [ 1276.243305] Kernel Offset: disabled [ 1276.982482] Rebooting in 86400 seconds..